
Future Privacy: A tipping point for tech
In celebration of Privacy Awareness Week we’re starting our new blog series “Future Privacy”, in which we’ll seek to understand and resolve some of the challenges many organisations face managing
In celebration of Privacy Awareness Week we’re starting our new blog series “Future Privacy”, in which we’ll seek to understand and resolve some of the challenges many organisations face managing
In this third and final post of our series on vulnerability management, elevenM’s Theo Schreuder explores some of the common challenges faced by those running vulnerability management programs.
“But has the horse has already bolted?” That’s the question senior US officials want companies who’ve applied patches for the highly publicised Microsoft Exchange security breach to ask themselves.
From the 22 questions on notice, consent, and use and disclosure in the Privacy Act issues paper, there is one underlying question: Who should bear responsibility for safeguarding individuals’ privacy?
This is the second post in a three-part series on vulnerability management. In this post, elevenM’s Theo Schreuder describes the six steps of a vulnerability management program. In the first
In this post from our ‘Privacy in focus’ blog series, we explore arguments for and against changes to the definition of personal information being considered by the review of the
elevenM’s Cassie Findlay looks at getting the most out of standards. Cassie is a current member of the Standards Australia Committee on Records Management and a former member of the International Organization for Standardization
This is the first post in a three-part series on vulnerability management. In this post, elevenM’s Theo Schreuder explains why vulnerability management is so important and outlines some key considerations
elevenM turned five this week. I recall a stat from university that half of all small businesses fail within the first five years. I am not sure if that stat
In this post from our ‘Privacy in focus’ blog series, we explore the key voices and perspectives shaping the review of the Privacy Act. If you want to know where