To realise the potential of the Digital ID Act and the recently unveiled Trust Exchange (TEx), the government must move past political soundbites and develop a comprehensive identity and credentials strategy that includes building technical …
Southeast Asian countries have made an important step towards operationalising UN standards on government cyberspace behaviour, but the job is far from finished. On behalf of the Association of Southeast Asian Nations, Singapore last week …
Any attempt to regulate artificial intelligence is likely to be ineffective without first ensuring the availability of trusted large-scale sovereign data sets. For the Australian government, AI presents transformative potential, promising to revolutionise the way …
Cyber defences can be alert to malware. It’s much harder to be alert to intruders who use the targeted system’s own resources against the owner. In cybersecurity, such attack methods are called ‘living off the …
The Crowdstrike software outage disrupted airlines, banks, supermarkets and other major services—causing significant inconvenience for millions of people worldwide. It has prompted many to marvel that so many global operations and organisations rely on so …