The spooky season is still not over for Australian companies, as the destructive Emotet threat is back, and it is affecting unpatched systems.
James Ley, Ivanti |
09 Dec |
Read more
Ensuring top-level enterprise security has never been more important for the financial services (FS) industry.
Monica Hovsepian, OpenText |
09 Dec |
Read more
Tricking cyber-criminals into revealing their presence is becoming an increasingly popular way to safeguard systems and data from attack.
Jim Cook |
09 Dec |
Read more
Modern terrorism and cyberwar are major threats to our society’s way of life.
Craig Ford |
30 Dec |
Read more
You have a very secure environment, you have the latest firewalls which have been configured well, you have really good network segregation and you have the latest in endpoint detection and response platforms with a well-configured siem platform.
Craig Ford |
20 Dec |
Read more
More than 23,000 Australian businesses fell victim to cyber incidents in 2019.
Joan Pepin, Auth0 |
09 Dec |
Read more
The Australian government’s new Draft Code of Practice for Securing the Internet of Things for Consumers is an excellent foundation which contains many best practices for making connected devices more resilient to cyberattacks and increasing the privacy of personal information.
Joseph Carson |
09 Dec |
Read more
I don't know about the rest of you, but I seem to spend a bit of time lately in rideshares like Uber, Didi, Ola or any of the other new entrants to the market.
Craig Ford |
17 Dec |
Read more
Australia’s Communications Minister recently announced telecommunications companies will be required to adhere to tighter regulations around identity verification for those porting mobile numbers from one provider to another.
Simon Marchand |
03 Dec |
Read more
I have some red team/pentest jobs coming up and I was trying to think of how I could get into an organisation with a bit of style while having some fun.
Craig Ford |
03 Dec |
Read more
Throughout 2019, technology has continued to have a transformative impact on businesses and communities.
Dave Russell, Veeam |
28 Nov |
Read more
Multifactor authentication or MFA for short.
Craig Ford |
28 Nov |
Read more
Despite admirable efforts in the form of introducing mandatory data breach notification laws, Australia continues to struggle with data breaches.
Ashley Watkins |
25 Nov |
Read more
When a data breach occurs, the first question often asked is ‘where did it come from?’. It should be ‘how did they get in?’.
J.J. Thompson, Sophos |
25 Nov |
Read more
A close analysis of the cybersecurity attacks of the past shows that, in most cases, the head of the cyber kill chain is formed by some kind of privilege abuse.
Shwetha Sankari, ManageEngine |
25 Nov |
Read more
In recent years, Slack has transformed from a relatively unknown cloud application into one of the world’s most popular team collaboration solutions in the world.
Anurag Kahol, Bitglass |
25 Nov |
Read more
There are two ugly truths of cybersecurity. The first is that it takes a lot longer for cybersecurity professionals to discover the presence of malware than anyone cares to admit.
Andrew Huntley, Barracuda |
25 Nov |
Read more
Zero trust is a regular topic of conversation for most CSOs today.
Darran Rolls |
18 Nov |
Read more
The good news about the next era of digital transformation is how companies are becoming intelligent enterprises.
Susan Galer, SAP |
18 Nov |
Read more
The rapid growth of enterprise mobility and a growing reliance on bring your own device (BYOD) means that most enterprises have to deal with the challenge of securing corporate data in the cloud.
David Shephard |
12 Nov |
Read more