The ineffectiveness of traditional antivirus (AV) , which catches less than half of noteworthy malicious events, is causing untold damage to organisations worldwide
Kane Lightowler |
08 Dec |
Read more
The integrity of information will be one of the biggest challenges global consumers, businesses and governments face in 2017, where information from previously venerated sources is no longer trusted.
John Worrall |
06 Dec |
Read more
With a number of recent high profile, high volume DDoS attacks occurring via cyber attackers compromising insecure connected devices to build massive botnets, security concerns around the influx of Internet of Things devices are justifiably rising.
Robin Schmitt |
06 Dec |
Read more
Conventional wisdom has it that SaaS vendors – that is, those that market cloud-based software-as-a-service – often maintain higher levels of information security than their clients.
Jim Buchanan |
30 Nov |
Read more
Imagine life without our smartphones, tablets, digital televisions and the Internet. We would still be stuck in the early 90s.
Nathan Lowe |
29 Nov |
Read more
Another year is drawing to a close. We often hear the phrase, “Where does the time go?” when we look back on the year that’s gone.
Leon Adato |
28 Nov |
Read more
Identity and access management (IAM) has traditionally been associated with solutions designed to manage employee access to on-premises applications and systems, but these days it’s a whole lot more.
Mark Perry |
01 Nov |
Read more
Cybersecurity is the hottest topic in the IT world at the moment, thanks to the massive DDoS attacks against Brian Krebs' "Krebs on Security" website, against French hosting provider OVH, and, most recently, against Dyn’s DNS service, all of which came from compromised IoT devices, including DVRs and security cameras.
Kimberley Parsons Trommler |
28 Oct |
Read more
It’s no secret digital technologies have changed everything.
Joshua Kennedy-White |
25 Oct |
Read more
As commerce continues to shift online, IT managers are finding themselves juggling two competing priorities.
Mark Perry |
14 Oct |
Read more
A hospital staff member, expecting delivery of an online purchase, opens an email claiming to contain details of a parcel delivery.
Nathan Lowe |
12 Oct |
Read more
Cyber-attacks continue to become more advanced and sophisticated than ever before.
Steve Durbin |
11 Oct |
Read more
Investing your personal money in any of the many financial services that exist presents an element of risk.
Ben Barlow |
06 Oct |
Read more
The importance of context should never—ever—be underestimated. Put up a sign across a path saying “Keep Out” and you can guarantee it will be ignored, and by a sizeable majority.
Maurizio Canton |
02 Sep |
Read more
Every organisation is facing a new set of security challenges as they amass data says Nuix's Jim Kent.
Paul Wallbank |
25 Aug |
Read more
Gone are the days when data was confined to the data centre and we could put a virtual fence around it and protect it. Now data is everyone with multiple copies of it. This causes a massive headache for CISOs who are tasked with protecting this data from falling into the wrong hands. The question then arises, with data literally everywhere, how do we achieve this?
Ashwin Pal |
02 Aug |
Read more
Research is in progress that will make it easier to find patterns of attack by cyber-criminals, and share results with the larger community.
Brett Williams |
27 Jul |
Read more
Since first appearing in the late 1980s, ransomware has evolved to become a multi-million dollar business.
Simon Howe |
19 Jul |
Read more
I’m posting this story from London a few minutes after Prime Minister David Cameron announced his resignation following the decision to exit the EU. What is the implication of this momentous vote on Britain?
David Gee |
06 Jul |
Read more
Australian companies are seriously lagging behind their US and UK counterparts when it comes to cyber security. According to Deloitte, Australian companies could risk becoming “low-hanging fruit” for cyber criminals due to a lack of education and an unwillingness to properly deal with cyber threats.
Liam Rowland |
27 Apr |
Read more