Jody King

See how Sydney Airport meets the Essential Eight with Rubrik ransomware defence
Improving Essential Eight compliance is also important for wider regulatory compliance

Debunk the myths and develop an XDR strategy that works
Adding more people behind data streams to scale won’t keep up with automated attacks

Full-stack Observability: Expanding the Digital Experience and Impact with Advanced Business Context
This paper outlines the critical aspects of full-stack observability: what it is and why itʼs different from traditional monitoring. It empowers a...

Information Security in changing times: Can you deliver Essential 8 compliance out of the box?
You need someone to go with you on the Essential 8 journey, so clearly articulate your risk appetite and what you are willing to accept

Countering cyber threats to your critical infrastructure
How a combination of training, checklists, and technology can help critical infrastructure managers meet new obligations around managing and...
Learn

See how Sydney Airport meets the Essential Eight with Rubrik ransomware defence
Improving Essential Eight compliance is also important for wider regulatory compliance

Debunk the myths and develop an XDR strategy that works
Adding more people behind data streams to scale won’t keep up with automated attacks

Full-stack Observability: Expanding the Digital Experience and Impact with Advanced Business Context
This paper outlines the critical aspects of full-stack observability: what it is and why itʼs different from traditional monitoring. It empowers a...

Information Security in changing times: Can you deliver Essential 8 compliance out of the box?
You need someone to go with you on the Essential 8 journey, so clearly articulate your risk appetite and what you are willing to accept

Countering cyber threats to your critical infrastructure
How a combination of training, checklists, and technology can help critical infrastructure managers meet new obligations around managing and...