Cyber

Learn about Scattered Spider — a financially motivated threat actor behind multiple high-profile breaches — and how to reduce your exposure to their evolving intrusion techniques.
A clear, practical guide for C-suite leaders and risk managers on how to navigate the NDB scheme
An actionable cybersecurity guide for any Australian business.
Technical threats must be translated into financial risks that a Chief Financial Officer (CFO) can understand
Learn about Salt Typhoon, a state-sponsored Chinese threat actor, and how to protect your organisation from its advanced cyber-espionage tactics.
You’ve smartly invested in Cisco as the bedrock of your network infrastructure or in Splunk for top-tier Security Information and Event Management. It’s completely natural to have questions about how these two titans are coming together.
Retail has entered its next evolutionary phase: the convergence of digital and physical experiences. In today’s omnichannel world, shoppers expect a seamless journey—from browsing online to buying in-store, returning via click-and-collect, or getting tailored offers on their phones as they walk past a shopfront.
Access our exclusive on-demand webinar, “Future-Proof Your K-12: Strategic Technology Planning,” designed specifically for K-12 leaders and technology teams. In this insightful session, we’ll equip you with the essential strategies to create dynamic, engaging, and future-ready learning environments.
Use this quick reference checklist to guide your K-12 tech transformation over the summer break
Unlock the secrets of healthcare cybersecurity with insights from our distinguished guest, Jason Payne, Sales Director of ANZ at Claroty Healthcare.
Discover how AI is transforming the battlefield of cybersecurity with Glenn Maiden, Director of Threat Intelligence at Fortiguard Labs, ANZ, as our guide.
Discover the fascinating world of cybersecurity with our special guest, Glenn Maiden, Director of Threat Intelligence at FortiGuard Labs, ANZ.
Unlock the secrets of the ever-evolving world of technology with Carl Solder, CTO of Cisco ANZ, as we navigate the convergence of IT and OT.
Discover how digital forensics is revolutionising the fight against intellectual property theft and misconduct in the ever-evolving landscape of cybersecurity.
Discover the riveting journey of Darren Hopkins, a distinguished partner at McGrath McNichol, who transitioned from the Queensland Police Service to the forefront of digital forensics and cybersecurity.
IT is data-centric. OT is process-centric. Together, they can create an organisation that’s future-centric. Read on to learn how integrating IT and OT systems can unlock a whole new world of efficiency
Ever wondered what it takes to stay ahead in the fast-paced world of cybersecurity? Join us this week to learn what it takes.
By consolidating security services with a Managed Security Service Provider (MSSP), organisations can streamline operations, reduce costs, and enhance their overall cyber defence posture.
Ready to unlock the full potential of the digital future? Join us as we sit down with Nathan McGregor, Senior Vice President of APAC at Cradlepoint.
What if your small business could fend off sophisticated cyberattacks with the same prowess as a large corporation?
Embark on a thrilling expedition into the heart of cybersecurity as we sit down with Wayne Phillips, APJ Field CTO for SentinelOne.
For decades, the financial sector has been a prime target of cyber-attacks, a trend that started well before the recent spike in data breaches across other industries. To keep pace with the evolving tactics of cyber criminals, financial institutions have had to continuously hone their cyber defence mechanisms. Orro’s Director of Cyber Services, Manuel Salazar, offers insights into what SMEs can learn from a sector that’s become battle-hardened in the face of relentless cyber threats.
The digital landscape is evolving faster than ever, and with it, the nature of cyber threats. Fortinet’s Global Threat Landscape Report for the second half of 2023 reveals crucial trends and strategies necessary for robust cybersecurity defences. We’ve wrapped up the key takeaways in one article.
Join Michael van Rooyen (MVR) as he delves into the intricate world of cybersecurity with Cris Bailiff, the CTO for Orro’s Cyber Services Division.
The Future of Cybersecurity: Navigating Digital Transformation with Confidence
A summary of some key takeaways from the Fortinet Accelerate 2024 even in Las Vegas, which provide a forward-looking perspective on the future state of cybersecurity.
Join Michael van Rooyen (MVR) as he delves into the realm of cybersecurity with Corien Vermaak, the Director of Cybersecurity for Australia and New Zealand at Cisco.
Embark on a critical journey into the heart of cybersecurity as MVR sits down with Michael Murphy from Fortinet to dissect the frontlines of operational technology and infrastructure protection.
As we step into 2024, the ongoing integration of technology is bringing both unparalleled connectivity and even greater security risks.
An insight into Orro’s Director of Cyber Services, Manny Salazar on cyber attacks, crime & security.
As the threat of a cyber attack continues to grow, it has become clear that traditional perimeter-based defences are no longer sufficient. Data breaches and cyber attacks continue to make headlines, and the risk to business operations, customer data and reputation means a robust security approach is now critical.
An insight into Orro’s Chief Technology Officer, Michael Van Rooyen’s account of the 28th Annual Cisco Partner Summit.
The increasing reliance on digital infrastructure in our deeply interconnected world has rendered organisations susceptible to cyber threats. Data breaches, ransomware attacks, and other cyber incidents continue to occur, causing severe financial losses, reputational damage and legal consequences for the organisations impacted.
Cyber security continues to pose a significant risk to businesses around the globe. But while many businesses are moving to better protect their data, systems and customers, it can be easy to forget that cyber security and network security are intertwined.
White and purple bottom divider.