And, because of the magic of time differences and the international date line Australia was the first IDG Security Day event running. As it's the sumer solstice in the Northern hemisphere, it's also the longest day so it makes sense to fill it with as much infosec goodness as we possibly can.
Abigail Swabey |
23 Jun |
Read more
Integrating visibility and security controls directly into virtual machines is helping companies enforce security policies across cloud-based application architectures, a senior VMware security executive has shared as the company ramps up the latest volley in its salvo to bring security to the data centre.
David Braue |
22 Jun |
Read more
Microsoft lifts the time limit on its Edge bug bounty program
Liam Tung |
22 Jun |
Read more
Work on the government’s security strategy is progressing nicely, by some accounts, even as the digital economy presents new challenges for cybersecurity during the transformation process.
David Braue |
19 Jun |
Read more
Australian businesses need to get over their fear of being singled out under looming breach notification laws and be prepared to use public shaming as a trigger for internal transformation, two security consultants have advised as the February 2018 implementation deadline for Australia’s new |Notifiable Data Breaches (NDB) scheme draws ever nearer.
David Braue |
16 Jun |
Read more
Dealing with new vulnerabilities quickly is crucial to minimise damage and organisations should maintain crack teams of patching specialists to quickly deal with new vulnerabilities as they arise, one security specialist has advised as reports suggest the surge in malware and phishing attacks continues to grow unabated.
David Braue |
14 Jun |
Read more
Mimecast’s Garrett O’Hara spoke at this year’s AusCERT conference on the issue of cyber resilience and how companies, large and small, are being impacted and defrauded through email-born attacks.
Anthony Caruana |
14 Jun |
Read more
Chris Coryea comes from Leidos – a major MSSP in the United States which is comprised of about 33000 employees that come from the original Leidos MSSP business and Lockheed Martin's cyber security team. That brought together the MSSP capability with advanced analytics and Lockheed Martin's famed Cyber Security Kill Chain approach.
Anthony Caruana |
13 Jun |
Read more
A panel discussion at the recent Emerging Cyber Threats Summit, held in Sydney, looked at cybersecurity and the future of the digital economy. With more and more commerce and collaboration taking place digitally, there are great rewards but new risks that need to be considered.
Anthony Caruana |
13 Jun |
Read more
Working alongside the Prime Minister’s special adviser for all things cyber gives Jacob Boyle a unique perspective on the government’s role in securing the country – not just with all the services offered by government but also in working with businesses and the security industry.
Anthony Caruana |
13 Jun |
Read more
With so much emphasis on impending obligations under the federal government’s Notifiable Data Breaches (NDB) regime, many Australian companies are yet to appreciate their obligations under new European privacy guidelines that will go into effect just 3 months after the NDB.
David Braue |
13 Jun |
Read more
Researchers uncover well-crafted malware that's designed to disrupt core electricity substation equipment to cause outages.
Liam Tung |
13 Jun |
Read more
The internet today is not as safe as many think it is as there are cyber predators lurking around every corner. Cyber-attacks set a record in 2016, with big names like Yahoo! LinkedIn, Tumblr, Ashley Madison and Tesco falling prey to cybercriminals. And according to most cyber security experts, this trend is only going to increase.
Anas Baig |
12 Jun |
Read more
Red teaming is a well-known tool for improving your resilience to a cyber-attack. The idea is you have a team of people, either internal experts or internal people learning the craft with the support of external partners such as penetration testers, who play the part of hackers trying to infiltrate your organisation and execute a cyber-attack.
Anthony Caruana |
09 Jun |
Read more
Users tend to receive the most emails with malicious attachments on Thursdays and they’re most likely to click on messages in the morning purporting to be from the local postal service, according to an analysis of email attacks that has reinforced the importance of time and human factors for cybersecurity protection.
David Braue |
08 Jun |
Read more
On 22 February 2018, new laws mandating businesses to report the leak of personal identifiable information (PII) to the Office of the Australian Information Commissioner (OAIC) come into effect. During this year’s AusCERT conference Ben Di Marco and Matthew Pokarier walked through this new law and what it means for businesses.
Anthony Caruana |
08 Jun |
Read more
Any company operating a multi-storey office building would develop painstaking fire escape plans, and any hospital would develop backup plans detailing how it could operate in the event of a power failure. So, if responsible businesses are actively addressing these risks, why are so many companies still failing to lay down detailed plans for dealing with a cybersecurity incident?
David Braue |
08 Jun |
Read more
Nearly all security executives anticipate being attacked online this year but nearly half believe their cybersecurity team lacks the resources to address anything beyond simple security issues, according to new ISACA research that reinforces the growing risks posed by an increasingly-expensive cybersecurity climate.
David Braue |
07 Jun |
Read more
Cybercriminals have all but abandoned automated exploit kits in favor of tricking people into clicking things to install malware.
Liam Tung |
07 Jun |
Read more
Malware authors have been caught designing ransomware code to disable enterprise backup systems that might otherwise help victims recover their files, according to one security-industry research and development head.
David Braue |
06 Jun |
Read more