Deep fake is the golden egg for social engineering attacks
Social engineering attacks are one of the most used attack vectors that customers face in today's chaotic and often very challenging technology landscape.
Craig Ford | 24 Oct | Read more
Social engineering attacks are one of the most used attack vectors that customers face in today's chaotic and often very challenging technology landscape.
Craig Ford | 24 Oct | Read more
Do you feel confident in your cybersecurity efforts? After all, you’ve likely spent a bit of budget—sometimes quite a bit—on protecting your enterprise.
The financial services sector has been identified as one of the most sophisticated in Australia in terms of digital transformation, particularly with the forthcoming Consumer Data Right and inroads into Open Banking.
Jason Baden, F5 | 09 Sep | Read more
Every single day, the number of network connections grows delivering smarter organisations, smarter cities and increased personal convenience.
George Moawad, Genetec Inc. | 19 Jul | Read more
WARNING! Spoilers for Endgame ahead.
Thomas LaRock | 24 Jun | Read more
Remember the ransomware worm WannaCry back in 2017? After the carnage and financial damage it caused two years ago, the threat might be back again.
James Ley, Ivanti | 21 Jun | Read more
If you’ve worked in security for any length of time, you’ll have noticed that there is a vast range of security solutions in the market, and a never-ending supply of vendors ready to sell them to you.
Natasha Passley | 19 Jun | Read more
In the leadup to every Australian Federal election, the topic of online voting creeps onto the discussion agenda.
Phil Kernick, CQR Consulting | 01 May | Read more
In Ridley Scott’s 1982 sci-fi film Blade Runner, the “future” is set in 2019. In this version, the grey skies are littered with flying cars called “spinners”.
Ashley Stevenson, ForgeRock | 04 Apr | Read more
Failure has always been baked into the DNA of most successful cybersecurity awareness training programs.
Garrett O’Hara | 11 Mar | Read more
The digital age is maturing to the point where it’s no longer about what we can do, but whether we do the right thing. Where does that leave the question of facial recognition in schools?
Colin Anson | 11 Mar | Read more
Historically, death and taxes were cited as the only things certain in life. As the twenty-first century unfolds, it’s arguable a third item should be added to the list: cyber-security threats.
Mark Sinclair | 04 Mar | Read more
It’s as sure a bet as any. Another day? Another cybersecurity breach
Rilind Elezaj | 30 Jan | Read more
Just like the two Little Pigs who had their flimsy houses of straw and wood blown down one fateful afternoon by the Big Bad Wolf, many businesses today are still taking their chances with data disasters.
Chris Gondek, Commvault | 25 Jan | Read more
It has nearly been a year since the Notifiable Data Breach scheme came into effect in Australia and already 550 breaches have been reported.
Amit Singh, SonicWall | 18 Jan | Read more
Every technology user has a habitual relationship with their device —a unique way they use their laptop or smartphone.
Jeff Paine | 21 Dec | Read more
Let's say I was a cybercriminal or Blackhat hacker (The idea of being a black hat hacker is humorous to me, it would be a stretch for me to even be a Grey hat but let's go with the story) and I am starting my week with considering my latest target to loot.
Craig Ford | 19 Dec | Read more
Scammers and cyber criminals are very adept at coming up with new and inventive ways of tricking us into clicking that link and supplying our credentials or credit card information. I have seen emails and websites recently that look just like the real thing.
Ashwin Pal | 12 Dec | Read more
The financial sector provides some of the most important services in Australian society.
Alex Tilley | 18 Dec | Read more
Encryption has been around for a very long time and was used extensively in both world wars to transmit secret messages. The decoding by British Naval intelligence of the encrypted Zimmermann telegram in 1917 helped bring the United States into the war.
Jason Hilling | 02 Jun | Read more