A report by automation platform Ivanti reveals that majority of Australian CISOs polled agree that mobile phones have become a focal point of cybersecurity strategies. Respondents expect an increase in security budget and allocation in UEM software.
Almost two-thirds (64%) of chief information security officers in 14 countries believe they will be hit by a material cyber-attack in the next 12 months, the security firm Proofpoint says.
GUEST OPINION by Ashley Diffey, Country Manager – ANZ and Japan, Ping Identity: The societal changes that occurred during the past 12 months are undeniable, but what’s less talked about are the significant implications for data privacy. First, the massive shift to remote work changed the way data is accessed and secured. And a sharp rise in online transactions means more personal data is being exchanged, stored, and processed than ever before. Further, the amounts of personal data being collected by large technology companies continues to climb, shaking user trust.
GUEST OPINION by Tim Roughton, regional sales manager at Varonis: In 2020, many organisations struggled to secure their networks against the expanded threat surface created by the sudden transition to remote work. Businesses sped up plans to move to the cloud and relied on new collaboration approaches and adoption of tools to keep business moving. Companies focused on ensuring business continuity and remote access — all too often at the expense of security.
GUEST OPINION by Simon Howe, Vice President Sales Asia Pacific, LogRhythm: Cyber-security has ceased to be a backroom function and engaging effectively with the board and C suite will help CISOs provide better protection to the enterprise in 2021
A survey of cyber security professionals in NSW has found that 96.5% were working from home due to the coronavirus pandemic and the income of 12.6% had been affected due to the outbreak.
VENDOR CONTRIBUTION by Ryan Trost - Co-Founder & CTO, ThreatQuotient: Businesses continue to place more and more data in the cloud, from personal details to intellectual property. The growing adoption of cloud-based solutions by businesses, whether for greater agility, data analytics or to support employees in accessing the data, for example when they were remotely or from home, also increases the risk of cloud attacks.
A survey of 250 Australian chief information officers, chief technology officers and chief information security officers has found that both cyber attacks and breaches had risen during the last 12 months, prompting increased expenditure on cyber defences.
Australian and New Zealand enterprises are global leaders in board-level cyber security practice, with cyber security a top priority for organisations in the two markets and with boards taking a more hands-on approach to cyber security.
Chief executives of companies which experience security incidents are more likely to lose their jobs than the chief information officers or the chief information security officers of the same firms, a research firm claims.
In our previous article in the series, we introduced three security leaders who in the last twelve months have impressed us with the way they have navigated through their own challenges to improve productivity and skills in their teams and achieve positive outcomes within their organisations.
One of the most rewarding aspects of working for RSA and in the cyber security industry, is the opportunity to work alongside IT and Security leaders to address their security challenges, enabling them to enact real, meaningful change within their business. Change that reduces risk, bridges the gap between security leaders and business leaders, and enables organisational transformation.
I guess we can safely assume they're mining and selling our personal data to others.It's your ABC, but not your[…]
I agree. Not much new in these devices these days, but there is a big market out there for the[…]
Copying Samsung, which also has a A3x, A5x, A7x, A9x line up at similar price points.
Has Jennifer put the Dud in Dudley-Nicholson?
The problem lies with so-called pundits who are trying to push a particular line and do not bother to verify[…]