With 2018 coming to a close, the new year is on the horizon, and with it, new opportunities for enterprises to improve their security posture as bad actors elevate their tactics.
Lawrence Crowther, Head of Platform Architecture for APJ at Pivotal Software |
19 Dec |
Read more
Let's say I was a cybercriminal or Blackhat hacker (The idea of being a black hat hacker is humorous to me, it would be a stretch for me to even be a Grey hat but let's go with the story) and I am starting my week with considering my latest target to loot.
Craig Ford |
19 Dec |
Read more
As information security professionals approach the finish line of another year, it’s fair to say the past 12 months have once again been packed with incident.
Mark Lukie, senior sales engineer at Barracuda Networks |
18 Dec |
Read more
The threat landscape is constantly evolving to become more sophisticated, diverse and dangerous — and 2019 will be no different in welcoming completely new threats vectors and trends.
Gary Denman |
17 Dec |
Read more
It’s that time of year again when security professionals are preparing for the onslaught of security threats like phishing emails or other social engineering attacks to take advantage of people’s good nature or just the fact that most people are busy trying to get everything ready before they leave on their breaks.
Craig Ford |
13 Dec |
Read more
Data breaches continue to impact Australian organisations and businesses more than ever before.
Simon Eid |
17 Dec |
Read more
It’s a busy time of year. No matter the industry, the holiday season’s plateau in January is always preceded by the chaotic days and weeks in the lead up to Christmas.
Gary Mitchell |
18 Dec |
Read more
Digital currencies like Bitcoin and Ethereum operate unlike any other financial system.
Sam Bocetta |
12 Dec |
Read more
Scammers and cyber criminals are very adept at coming up with new and inventive ways of tricking us into clicking that link and supplying our credentials or credit card information. I have seen emails and websites recently that look just like the real thing.
Ashwin Pal |
12 Dec |
Read more
Staying abreast of the latest security tools, running more awareness training workshops for employees…the dawn of a new year is traditionally a time for turning over new leaves and resolving to do things differently and better.
Sumir Karayi |
11 Dec |
Read more
The week in security was dominated by Parliamentary dealings over the controversial ‘Encryption Bill’ that was pushed through into law – despite early and eventually fruitless stonewalling by Labor – without what many observers warned was adequate supervision and adequate controls despite revelations that previous controversial telecommunications data retention legislation was being abused.
David Braue |
11 Dec |
Read more
It seems not a day goes by without another report of a high-profile cybersecurity breach affecting companies worldwide.
Bede Hackney |
18 Dec |
Read more
Ever heard of Captain Richard de Crespigny? He may not be a household name like Captain Cook but he is no less of a hero. de Crespigny was the pilot who successfully steered an Airbus A380 to safety after it suffered engine failure over Singapore in 2010. His actions saved 469 lives.
John Karabin |
04 Dec |
Read more
The world is evolving and so is the way modern business operates when it comes to security; security teams now have to manage multiple systems, devices and data, stored both onsite or in the cloud.
Andrew Souter |
21 Dec |
Read more
As organisations embrace the concept of digital transformation, they’re finding new ways to digitalise old processes.
Philip Dimitriu |
19 Dec |
Read more
Once an organisation establishes a a threat hunting program, its goal is to hunt threats proactively, with a focus on newer, more sophisticated attacks for which reliable signatures or indicators are not yet available.
Rick McElroy |
30 Nov |
Read more
Cybersecurity is a really interesting and challenging industry to work in but it can be a lonely, isolated job.
Craig Ford |
27 Nov |
Read more
It’s been a big year in the cyber-security sector. Attacks on individuals and enterprises have become ever more frequent and the tactics employed by hackers and cyber-criminals ever more innovative.
Phil Kernick |
26 Nov |
Read more
Australia’s second ever cyberwar games took place in Sydney last month. Codenamed “Operation Shell Breaker”, Government representatives from Human Services, the Australian Tax Office and Home Affairs came together with corporate representatives from the banking, telco and energy sectors to take turns to attack and defend critical infrastructure networks on a Lego smart city.
Sam Ghebranious |
26 Nov |
Read more
Since the advent of cloud, organisations have been adopting it because its agility and flexibility can contribute to greater organisational efficiency and stronger performance.
Mauricio Sabena |
23 Nov |
Read more