Data Protection

The Economic Impact of Laws that Weaken Encryption

In December 2018, the Parliament of Australia passed the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (better known as TOLA) which expanded government authority and capabilities to circumvent digital data protections. TOLA created a framework by which law enforcement and intelligence agencies, or LEIAs, could request or require information technology providers, or […]

The Economic Impact of Laws that Weaken Encryption Read More »

Bachelor of Cyber Security

OVERVIEW Gain in-demand skills to protect data and information systems from hackers, with a Bachelor of Cyber Security at Victoria University. Our cyber-security degree opens many career possibilities. You will study information technology, preparing you for a career in software development or the networking industry. Then you will focus on specialised units in cyber security –

Bachelor of Cyber Security Read More »

Acronis Cyber Protection Week Global Report

KEY RESEARCH FINDINGS Investing in more solutions doesn’t mean more protection To protect business data, applications, and systems – particularly during the pandemic’s shift to remote work environments – organizations added new solutions to their IT environments. It’s not working. ~75% of IT professionals report that their organizations have all recommended cybersecurity technologies in place

Acronis Cyber Protection Week Global Report Read More »

Veeam Availability Suite

Veeam® Availability Suite™ is Veeam’s flagship solution that makes data management simple, flexible, and reliable. Take the stress out of maintaining your data by removing the manual processes associated with data protection, recovery, monitoring, ransomware protection, and compliance. It combines the industry-leading backup, restore and replication capabilities of Veeam Backup & Replication™ with the advanced monitoring and analytics of Veeam ONE™.

Veeam Availability Suite Read More »

Bring your own device: Bitglass’ 2020 Personal Device Report

As bring your own device (BYOD) approaches surge, largely driven by requirements to work flexibly with personal and mobile devices, the complexity of the security requirements have surged. To make the challenge even more pronounced, the expansion of the “extended workforce”— contractors, partners, customers, and suppliers— lends itself to new use cases (e.g. new apps,

Bring your own device: Bitglass’ 2020 Personal Device Report Read More »