Preventing problems like Meltdown and Spectre from reocurring requires software developers to be given sufficient information about hardware to ensure security.
Uber has admitted that the 2016 data breach puts at risk the personal information of 57 million users.
The Productivity Commission’s report on data availability and use is disappointing for consumers, who won't be able to stop firms collecting their data or challenge automated decisions made using it.
You can never be entirely protected from data breaches, but understanding your data is the first step to minimising the risk.
New legislation will soon require organisations to disclose any data breaches involving your private details. But the legislation still has some gaps in it.
Cyber threats are universal. But the appropriate response may be quite different in academia from what works in the corporate world.
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
There are many ways data can leak from organisations, and as long as companies leave it up to IT to solve, leaks will continue.