A selection of photos from a recent iTnews executive roundtable lunch at Society Restaurant in Melbourne. Source
Legacy authentication bypassed modern security controls and logging. Source
Follows similar ruling against Bunnings. Source
Figures revealed under GIPA Act. Source
New phishing menace exploiting users being helpful. Source
OpSec flub unmasked criminals. Source
Related to recent s1ngularity compromise. Source
Effective resilience requires more than just security tools Source
For relational and time-series data. Source
Ban comes into effect in December. Source
Marks first US publisher to take Google to court over AI-generated summaries. Source
Expands earlier Power Platform adoption. Source
Follows attack on LVMH in Hong Kong. Source
Moves away from dashboards. Source
Unknown amount of personal information harvested. Source
Cites "delivery challenges" and "updated timelines". Source
Gleans unique information on modus operandi and tools. Source
Can bypass common multi-factor authentication. Source
Digitises more of its mortgage processes. Source
But AI doubts linger. Source