Security technology

The Cyberlaw Podcast

A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis. Steptoe Cyberblog, with its sometimes contrasting insights, serves up opinionated and provocative thoughts on the issues especially cybersecurity and privacy, that arise at the intersection of law, information technology, and security.

The Cyberlaw Podcast Read More »

New research reveals APAC’s biggest application security challenges

The state of application security in 2021 Businesses are facing an array of challenges when it comes to application security. Over the years, web applications have been rising steadily as the top attack vector for breaches — and the move to remote work in 2020 intensified this shift. Many organizations had to expose internal applications

New research reveals APAC’s biggest application security challenges Read More »

CASR PART 101: Micro and Excluded Remotely Piloted Aircraft Operations

Drone safety rules made easy The Civil Aviation Safety Authority (CASA) has released a plain English guide for micro and excluded category remotely piloted aircraft (RPA) operations. It’s a practical guide for people who operate a drone as part of their job, including research, training, and professional, government and community services. All drone users may find it useful as

CASR PART 101: Micro and Excluded Remotely Piloted Aircraft Operations Read More »

Grand Theft Data II – The Drivers and Shifting State of Data Breaches

The report revealed that despite improvements in combating cybercrime and threats, IT security professionals are still struggling to fully secure their organisation and protect against breaches with 61 percent claiming to have experienced a data breach at their current employer. Adding to this challenge, data breaches are becoming more serious as cybercriminals continue to target intellectual property putting the reputation of the company brand at risk and increasing financial liability.

Grand Theft Data II – The Drivers and Shifting State of Data Breaches Read More »