The spooky season is still not over for Australian companies, as the destructive Emotet threat is back, and it is affecting unpatched systems.
James Ley, Ivanti |
09 Dec |
Read more
Ensuring top-level enterprise security has never been more important for the financial services (FS) industry.
Monica Hovsepian, OpenText |
09 Dec |
Read more
You have a very secure environment, you have the latest firewalls which have been configured well, you have really good network segregation and you have the latest in endpoint detection and response platforms with a well-configured siem platform.
Craig Ford |
20 Dec |
Read more
I don't know about the rest of you, but I seem to spend a bit of time lately in rideshares like Uber, Didi, Ola or any of the other new entrants to the market.
Craig Ford |
17 Dec |
Read more
Wondering why you keep hearing about cyber-security breaches every other day and questioning whether your current protection measures are fit for purpose?
Joanne Wong |
03 Dec |
Read more
Australia’s Communications Minister recently announced telecommunications companies will be required to adhere to tighter regulations around identity verification for those porting mobile numbers from one provider to another.
Simon Marchand |
03 Dec |
Read more
I have some red team/pentest jobs coming up and I was trying to think of how I could get into an organisation with a bit of style while having some fun.
Craig Ford |
03 Dec |
Read more
Throughout 2019, technology has continued to have a transformative impact on businesses and communities.
Dave Russell, Veeam |
28 Nov |
Read more
Multifactor authentication or MFA for short.
Craig Ford |
28 Nov |
Read more
Despite admirable efforts in the form of introducing mandatory data breach notification laws, Australia continues to struggle with data breaches.
Ashley Watkins |
25 Nov |
Read more
When a data breach occurs, the first question often asked is ‘where did it come from?’. It should be ‘how did they get in?’.
J.J. Thompson, Sophos |
25 Nov |
Read more
A close analysis of the cybersecurity attacks of the past shows that, in most cases, the head of the cyber kill chain is formed by some kind of privilege abuse.
Shwetha Sankari, ManageEngine |
25 Nov |
Read more
In recent years, Slack has transformed from a relatively unknown cloud application into one of the world’s most popular team collaboration solutions in the world.
Anurag Kahol, Bitglass |
25 Nov |
Read more
There are two ugly truths of cybersecurity. The first is that it takes a lot longer for cybersecurity professionals to discover the presence of malware than anyone cares to admit.
Andrew Huntley, Barracuda |
25 Nov |
Read more
The good news about the next era of digital transformation is how companies are becoming intelligent enterprises.
Susan Galer, SAP |
18 Nov |
Read more
The rapid growth of enterprise mobility and a growing reliance on bring your own device (BYOD) means that most enterprises have to deal with the challenge of securing corporate data in the cloud.
David Shephard |
12 Nov |
Read more
In SMB’s it is more likely that an unauthorised person would be called out for being somewhere they are not authorised because everyone would know each other and would be aware in most cases that a new person is starting.
Craig Ford |
12 Nov |
Read more
Data is like DNA. It’s billions of pieces of information that make us who we are; telling the world what we look like, what we enjoy and what we want.
Matt Oostveen |
11 Nov |
Read more
It's hard not to get worn down on the constant bombardment of new cyber breach after cyber breach.
Craig Ford |
11 Nov |
Read more
Despite global awareness of the need to improve security practices, organisations remain reluctant to make the changes to their IT environments that would help them to respond more effectively to today’s threats.
David Shephard |
05 Nov |
Read more