U.S. defense contractor arrested for giving U.S. secrets to Chinese operatives
Kevin Mallory maintained a clandestine relationship with People's Republic of China intelligence operatives from 2014-2017
Christopher Burgess | 07 Jul | Read more
Kevin Mallory maintained a clandestine relationship with People's Republic of China intelligence operatives from 2014-2017
Christopher Burgess | 07 Jul | Read more
Repercussions from the compromise of Medicare details continue to escalate, but in the longer term the incident serves as yet another reminder that the disconnect between security strategy and execution isn’t limited to Australia’s private sector.
David Braue | 06 Jul | Read more
The application of artificial intelligence (AI) techniques to analysing masses of security data may have become commonplace, but security incident-management specialist Demisto reports “great traction” amongst customers for an alternative platform that uses AI to learn from – and duplicate the actions of – human security specialists.
David Braue | 06 Jul | Read more
UK data protection watchdog draws a line between AI assistance and human doctors.
It’s déjà vu all over again as the aggressive Petrwrap global ransomware outbreak causes new headaches in Australia and abroad – and the global security community again excoriates businesses for poor patching and remediation strategies that make them sitting ducks for ransomware perpetrators.
David Braue | 28 Jun | Read more
Growing business engagement with issues around cybersecurity risk means the CISO function should ideally be moved out of the IT organisation, a senior security policy advisor has argued as organisations increasingly adopt business-level controls on growing software-as-a-service (SaaS) adoption.
David Braue | 23 Jun | Read more
Integrating visibility and security controls directly into virtual machines is helping companies enforce security policies across cloud-based application architectures, a senior VMware security executive has shared as the company ramps up the latest volley in its salvo to bring security to the data centre.
David Braue | 22 Jun | Read more
Microsoft lifts the time limit on its Edge bug bounty program
Work on the government’s security strategy is progressing nicely, by some accounts, even as the digital economy presents new challenges for cybersecurity during the transformation process.
David Braue | 19 Jun | Read more
Australian businesses need to get over their fear of being singled out under looming breach notification laws and be prepared to use public shaming as a trigger for internal transformation, two security consultants have advised as the February 2018 implementation deadline for Australia’s new |Notifiable Data Breaches (NDB) scheme draws ever nearer.
David Braue | 16 Jun | Read more
Dealing with new vulnerabilities quickly is crucial to minimise damage and organisations should maintain crack teams of patching specialists to quickly deal with new vulnerabilities as they arise, one security specialist has advised as reports suggest the surge in malware and phishing attacks continues to grow unabated.
David Braue | 14 Jun | Read more
Mimecast’s Garrett O’Hara spoke at this year’s AusCERT conference on the issue of cyber resilience and how companies, large and small, are being impacted and defrauded through email-born attacks.
Anthony Caruana | 14 Jun | Read more
Chris Coryea comes from Leidos – a major MSSP in the United States which is comprised of about 33000 employees that come from the original Leidos MSSP business and Lockheed Martin's cyber security team. That brought together the MSSP capability with advanced analytics and Lockheed Martin's famed Cyber Security Kill Chain approach.
Anthony Caruana | 13 Jun | Read more
A panel discussion at the recent Emerging Cyber Threats Summit, held in Sydney, looked at cybersecurity and the future of the digital economy. With more and more commerce and collaboration taking place digitally, there are great rewards but new risks that need to be considered.
Anthony Caruana | 13 Jun | Read more
Working alongside the Prime Minister’s special adviser for all things cyber gives Jacob Boyle a unique perspective on the government’s role in securing the country – not just with all the services offered by government but also in working with businesses and the security industry.
Anthony Caruana | 13 Jun | Read more
With so much emphasis on impending obligations under the federal government’s Notifiable Data Breaches (NDB) regime, many Australian companies are yet to appreciate their obligations under new European privacy guidelines that will go into effect just 3 months after the NDB.
David Braue | 13 Jun | Read more
Researchers uncover well-crafted malware that's designed to disrupt core electricity substation equipment to cause outages.
Red teaming is a well-known tool for improving your resilience to a cyber-attack. The idea is you have a team of people, either internal experts or internal people learning the craft with the support of external partners such as penetration testers, who play the part of hackers trying to infiltrate your organisation and execute a cyber-attack.
Anthony Caruana | 09 Jun | Read more
Users tend to receive the most emails with malicious attachments on Thursdays and they’re most likely to click on messages in the morning purporting to be from the local postal service, according to an analysis of email attacks that has reinforced the importance of time and human factors for cybersecurity protection.
David Braue | 08 Jun | Read more
On 22 February 2018, new laws mandating businesses to report the leak of personal identifiable information (PII) to the Office of the Australian Information Commissioner (OAIC) come into effect. During this year’s AusCERT conference Ben Di Marco and Matthew Pokarier walked through this new law and what it means for businesses.
Anthony Caruana | 08 Jun | Read more