Cyber Security Workshop
Brief Overview of the Workshop: So, do you think you can't be hacked?

Each year in Australia there are thousand...
"Your Ability to be Open-Minded and Adapt is Crucial."
We recently spoke with Marni Casanova, Senior Director, Technology Service Operations at T-Mobile; she is part of HDI...
Becoming a Self-Taught Cybersecurity Pro
Cybersecurity pros are in high demand, but you don't necessarily need to drop everything and go back to school to b...
Why You Must Kill Your VPN to Support Remote Work
Organizations must overcome the limitations of VPNs to become true digital businesses and rethink how they can better su...
How Cybercriminals Use Social Engineering to Access Sensitive Information
While some hacks are sophisticated, many more rely on gaining the trust of employees to gain essential credentials to co...
Why and How to Use Workflow Automation Software
New AI may now be able to take on repetitive managerial tasks. Here's a case for utilizing new automation tools to e...
Prioritize Customer Security As E-Commerce Grows
E-commerce sales are booming, and businesses have chosen expediency over security as they raced to keep up with customer...

ITIL® and PRINCE2® are registered trade marks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

RESILIA™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

DevOps Foundation®, is a registered mark of the DevOps Institute.

HDI® is a Registered Trade Mark. HDAA is the Australasian Gold Partner of HDI®.

KCS® is a Service Mark of the Consortium for Service Innovation™.