Are your people who they say they are?
Every technology user has a habitual relationship with their device —a unique way they use their laptop or smartphone.
Jeff Paine | 21 Dec | Read more
Every technology user has a habitual relationship with their device —a unique way they use their laptop or smartphone.
Jeff Paine | 21 Dec | Read more
With 2018 coming to a close, the new year is on the horizon, and with it, new opportunities for enterprises to improve their security posture as bad actors elevate their tactics.
Lawrence Crowther, Head of Platform Architecture for APJ at Pivotal Software | 19 Dec | Read more
Let's say I was a cybercriminal or Blackhat hacker (The idea of being a black hat hacker is humorous to me, it would be a stretch for me to even be a Grey hat but let's go with the story) and I am starting my week with considering my latest target to loot.
Craig Ford | 19 Dec | Read more
As information security professionals approach the finish line of another year, it’s fair to say the past 12 months have once again been packed with incident.
Mark Lukie, senior sales engineer at Barracuda Networks | 18 Dec | Read more
The threat landscape is constantly evolving to become more sophisticated, diverse and dangerous — and 2019 will be no different in welcoming completely new threats vectors and trends.
Gary Denman | 17 Dec | Read more
The case for a managed DDoS protection and mitigation service is well established. Partnering with a provider that can oversee the system’s operation eliminates a big IT issue, augments staff resources, and provides access to specialised DDoS expertise.
Jason Hilling | 13 Dec | Read more
It’s that time of year again when security professionals are preparing for the onslaught of security threats like phishing emails or other social engineering attacks to take advantage of people’s good nature or just the fact that most people are busy trying to get everything ready before they leave on their breaks.
Craig Ford | 13 Dec | Read more
Data breaches continue to impact Australian organisations and businesses more than ever before.
It’s a busy time of year. No matter the industry, the holiday season’s plateau in January is always preceded by the chaotic days and weeks in the lead up to Christmas.
Gary Mitchell | 18 Dec | Read more
Scammers and cyber criminals are very adept at coming up with new and inventive ways of tricking us into clicking that link and supplying our credentials or credit card information. I have seen emails and websites recently that look just like the real thing.
Ashwin Pal | 12 Dec | Read more
The week in security was dominated by Parliamentary dealings over the controversial ‘Encryption Bill’ that was pushed through into law – despite early and eventually fruitless stonewalling by Labor – without what many observers warned was adequate supervision and adequate controls despite revelations that previous controversial telecommunications data retention legislation was being abused.
David Braue | 11 Dec | Read more
This year we saw attackers become much smarter and harder to detect. They’ve thrown away a lot of the tools they used to rely on, in favour of tactics that slip by traditional defences completely undetected.
Carlo Minassian | 07 Dec | Read more
The financial sector provides some of the most important services in Australian society.
Alex Tilley | 18 Dec | Read more
Ever heard of Captain Richard de Crespigny? He may not be a household name like Captain Cook but he is no less of a hero. de Crespigny was the pilot who successfully steered an Airbus A380 to safety after it suffered engine failure over Singapore in 2010. His actions saved 469 lives.
John Karabin | 04 Dec | Read more
With under a month now to Christmas, many people are starting to attend company Christmas parties and social events.
Craig Ford | 03 Dec | Read more
The world is evolving and so is the way modern business operates when it comes to security; security teams now have to manage multiple systems, devices and data, stored both onsite or in the cloud.
Andrew Souter | 21 Dec | Read more
Once an organisation establishes a a threat hunting program, its goal is to hunt threats proactively, with a focus on newer, more sophisticated attacks for which reliable signatures or indicators are not yet available.
Rick McElroy | 30 Nov | Read more
Cybersecurity is a really interesting and challenging industry to work in but it can be a lonely, isolated job.
Craig Ford | 27 Nov | Read more
In the digital era, cyber-security is – or should be – a prime concern for Australian organisations of all stripes and sizes.
Joanne Wong | 26 Nov | Read more
It’s been a big year in the cyber-security sector. Attacks on individuals and enterprises have become ever more frequent and the tactics employed by hackers and cyber-criminals ever more innovative.
Phil Kernick | 26 Nov | Read more