Richard Giddey

“Revenge Porn” and Image-Based Abuse: Shattering Trust and Mental Health

“Revenge Porn” and Image-Based Abuse: Shattering Trust and Mental Health A Growing Crisis in Australia Image-based abuse (IBA), often referred to as “revenge porn,” involves the non-consensual sharing, distribution, or threat to share intimate images. In Australia, this issue has escalated significantly in recent years, reflecting the complex intersection of technology, trust, and control. Prevalence: […]

“Revenge Porn” and Image-Based Abuse: Shattering Trust and Mental Health Read More »

Domestic Violence in the Digital Age: Tech Abuse & Trauma

Domestic Violence in the Digital Age: Tech Abuse & Trauma

Domestic Violence in the Digital Age: Tech Abuse & Trauma For countless Australian survivors of domestic and family violence, technology-facilitated abuse has become just as damaging — and far more inescapable — than physical harm. The phone in your pocket, the camera in your home, even the smart device tracking your steps can become instruments

Domestic Violence in the Digital Age: Tech Abuse & Trauma Read More »

Cyberbullying in Australian Schools: Breaking the Cycle

Cyberbullying in Australian Schools: Breaking the Cycle Cyberbullying has reached over half of young Australians – in fact, about 51% of Aussie youths (aged 12–25) have experienced some form of cyberbullying in their lifetime​ headspace.org.au . Unlike old-school bullying that stopped at the school gate, online abuse can follow teens 24/7 via smartphones and social

Cyberbullying in Australian Schools: Breaking the Cycle Read More »

Exploring Personalities in Online Gaming and VR Communities

Exploring Personalities in Online Gaming and VR Communities

Exploring Personalities in Online Gaming and VR Communities The advent of online gaming and virtual reality (VR) has fostered the creation of diverse and vibrant communities. Within these digital landscapes, players from various backgrounds come together, bringing with them unique personalities and behaviors. Understanding these personalities can enhance our appreciation of online interactions and improve

Exploring Personalities in Online Gaming and VR Communities Read More »

The Truth Behind the Headsets: Unveiling the Personalities of VR Gaming Friends

The Truth Behind the Headsets: Unveiling the Personalities of VR Gaming Friends

The Truth Behind the Headsets: Unveiling the Personalities of VR Gaming Friends Introduction Virtual Reality (VR) gaming not only revolutionizes how we play games but also how we interact within them. This article explores how real-world personality traits are represented in VR and how they might predict the roles individuals may gravitate towards, both in-game

The Truth Behind the Headsets: Unveiling the Personalities of VR Gaming Friends Read More »

Considerations for Operational Technology Cybersecurity

Considerations for Operational Technology Cybersecurity

Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security architectures. The convergence of

Considerations for Operational Technology Cybersecurity Read More »

91% of ransomware victims paid at least one ransom in the past year, survey finds

91% of ransomware victims paid at least one ransom in the past year, survey finds

91% of ransomware victims paid at least one ransom in the past year, survey finds More than half of organizations globally (58%) have experienced six or more ransomware attack attempts in the past year, and 91% of victims paid at least one ransom, according to a survey by ExtraHop, a network detection and response security

91% of ransomware victims paid at least one ransom in the past year, survey finds Read More »

UK enacts IoT cybersecurity law - Help Net Security

UK enacts IoT cybersecurity law – Help Net Security

UK enacts IoT cybersecurity law The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure policy. “Most smart devices are manufactured outside the UK, but the PSTI act also applies to

UK enacts IoT cybersecurity law – Help Net Security Read More »

Agencies to turn toward ‘skill-based hiring’ for cyber and tech jobs, ONCD says

Agencies to turn toward ‘skill-based hiring’ for cyber and tech jobs, ONCD says Federal agencies by next summer will embrace skill-based hiring — rather than hiring based on degrees or years of experience — for IT jobs that today total nearly 100,000 federal employees, the nation’s cyber chief said Monday. Speaking at a White House

Agencies to turn toward ‘skill-based hiring’ for cyber and tech jobs, ONCD says Read More »

Cybersecurity firm Darktrace agrees $5.3bn sale to US private equity business

Cybersecurity firm Darktrace agrees $5.3bn sale to US private equity business

The Cambridge-based cybersecurity and artificial intelligence company Darktrace is likely to become the latest British technology champion to be swallowed up by a US suitor, after it agreed a $5.3bn (£4.2bn) sale to US private equity business Thoma Bravo. Darktrace, whose co-founding investor Mike Lynch is now on trial for fraud and conspiracy in the

Cybersecurity firm Darktrace agrees $5.3bn sale to US private equity business Read More »

Scroll to Top