The role of artificial intelligence in improving security defences has expanded dramatically in recent years – but it may have expanded a bit too far, with a UK court blasting the provision of patient healthcare data to Google’s DeepMind for analysis.
David Braue |
10 Jul |
Read more
It’s déjà vu all over again as the aggressive Petrwrap global ransomware outbreak causes new headaches in Australia and abroad – and the global security community again excoriates businesses for poor patching and remediation strategies that make them sitting ducks for ransomware perpetrators.
David Braue |
28 Jun |
Read more
Two out of three merchants fail to make any changes to their fraud prevention strategies even after they suffer a data breach, according to a merchant survey that also found those merchants are more concerned with reputational damage from a breach than the actual loss of data.
David Braue |
28 Jun |
Read more
Integrating visibility and security controls directly into virtual machines is helping companies enforce security policies across cloud-based application architectures, a senior VMware security executive has shared as the company ramps up the latest volley in its salvo to bring security to the data centre.
David Braue |
22 Jun |
Read more
Identity-as-a-service (IDaaS) providers are enjoying growing momentum as businesses increasingly accept that their legacy Identity and access management (IAM) systems are too old and inflexible to securely support cloud applications.
David Braue |
16 Jun |
Read more
Mobile malware accounted for nearly 1 in 10 malware strains detected during the first quarter, Fortinet has warned on the back of research findings that also suggested that a similar proportion of companies had been hit by ransomware during the quarter.
David Braue |
14 Jun |
Read more
Dealing with new vulnerabilities quickly is crucial to minimise damage and organisations should maintain crack teams of patching specialists to quickly deal with new vulnerabilities as they arise, one security specialist has advised as reports suggest the surge in malware and phishing attacks continues to grow unabated.
David Braue |
14 Jun |
Read more
You'd think, judging by much of the coverage you see in cybersecurity magazines and articles that we are in an ever-escalating arms race where the only course of action we have against threat actors is to get bigger, faster and more expensive technology. But that's like saying the only way to protect your home from burglars or a fire is alarm systems and bars on the windows.
Anthony Caruana |
14 Jun |
Read more
This is what Dr Seuss said and it’s something former Telstra CISO discussed during his opening keynote address at the Emerging Cyber Threats summit held in Sydney on 7 and 8 June 2017.
Anthony Caruana |
13 Jun |
Read more
Red teaming is a well-known tool for improving your resilience to a cyber-attack. The idea is you have a team of people, either internal experts or internal people learning the craft with the support of external partners such as penetration testers, who play the part of hackers trying to infiltrate your organisation and execute a cyber-attack.
Anthony Caruana |
09 Jun |
Read more
Malware writers have come up with a novel way to install malware from Office that doesn't rely on tricking users to enable macros.
Liam Tung |
09 Jun |
Read more
Users tend to receive the most emails with malicious attachments on Thursdays and they’re most likely to click on messages in the morning purporting to be from the local postal service, according to an analysis of email attacks that has reinforced the importance of time and human factors for cybersecurity protection.
David Braue |
08 Jun |
Read more
Australian IT experts are struggling to secure increasingly complex networks and increasing compliance pressure isn’t providing enough incentive for change, a security expert has warned as looming breach-notification legislation threatens to publicly expose poor risk management practices and their consequences.
David Braue |
08 Jun |
Read more
Nearly all security executives anticipate being attacked online this year but nearly half believe their cybersecurity team lacks the resources to address anything beyond simple security issues, according to new ISACA research that reinforces the growing risks posed by an increasingly-expensive cybersecurity climate.
David Braue |
07 Jun |
Read more
Cybercriminals have all but abandoned automated exploit kits in favor of tricking people into clicking things to install malware.
Liam Tung |
07 Jun |
Read more
Malware authors have been caught designing ransomware code to disable enterprise backup systems that might otherwise help victims recover their files, according to one security-industry research and development head.
David Braue |
06 Jun |
Read more
While AI and machine learning are buzzwords, Symantec's Nick Savvides said, during this year's AusCERT conference they have been a big deal in computing circles since the 1950s. But it was in the 1980s when AI came into mainstream thinking a culture. It was movies like War Games and The Terminator, and TV shows like Knight Rider that took this important technology and moved it into mainstream consciousness.
Anthony Caruana |
05 Jun |
Read more
AusCERT’s annual conference returned, with experts across a variety of fields echoing concerns about changing legal and technological policies as well as reassessing the role of identity-based perimeters and the dangers posed by the intersection of convenience and trust.
David Braue |
05 Jun |
Read more
With so many security projects and initiatives taking place across Australia and New Zealand, being chosen as the best security initiative of the last year is a great recognition of strong work over the last year. Kasada (https://www.kasada.io) was rewarded for their work on thwarting bot attacks at the 2017 AusCERT conference.
Anthony Caruana |
05 Jun |
Read more
It may have sent European businesses scrambling and the security community abuzz, but the WannaCry ransomware attack’s fizzling in the United States and Australia means its legacy will be mostly as a cautionary tale – and, one security expert warns, a potential distraction from more important security issues.
David Braue |
02 Jun |
Read more