|
A new research report has debunked five “false assumptions” that people have about social engineering which are integral to why so many fall victim to these forms of cyberattack.
Promising to safeguard your business without the complexity, the CyberStash eclipse.xdr cyber defence system is a new platform to protect businesses from cyber attacks and minimise the likelihood of business impact.
COMPANY NEWS: Canberra-headquartered artificial intelligence compliance software specialist, Castlepoint Systems, has been named in the CyberTech100, an annual list that recognises 100 of the world’s most innovative cyber technology companies.
This is the last entry in Team82’s series examining the security of network management systems for the Extended Internet of Things (XIoT). Read our previous reports looking into Nagios XI and Moxa MX View.
By 2025, 60% of organisations will use cybersecurity risk as a primary determinant in conducting third-party transactions and business engagements, according to research firm Gartner’s report on the top eight cybersecurity predictions for 2022-23.
Cybermindz.org launches the world’s first peer-led, cybersecurity mental health support program. This important initiative was launched by NSW Minister for Customer Service and Digital Government, Victor Dominello, and the launch was followed by a panel event of leading industry experts, as you can see in the on-demand stream of the Thursday 16 June launch event, details below.
GUEST OPINION: Cybersecurity incidents continue to plague Australian organisations with malicious attacks increasing in size, scope and sophistication. Alarmingly, each one exposes sensitive critical infrastructure to risks and has the potential to cause significant disruption to essential services - costing the Australian government billions of dollars. Against the backdrop of a burgeoning cyber threat landscape, the need to better protect our public and private sector organisations is crystal clear, as is the urgency with which we must produce the local skills to support that need.
Australian small businesses will have access to a range of tools and services to help them stay safe online, with a collaboration between the Australian Cyber Collaboration Centre (A3C) and the non-profit organisation Global Cyber Alliance (GCA).
COMPANY NEWS: SonicWall, a global leader delivering Boundless Cybersecurity, today announced the Asia-Pacific and Japan (APJ) regional winners for the SonicWall Partner Awards for the fiscal year 2022. The award honours SonicWall’s top-performing distributors and partners that have made outstanding contributions to drive the company’s most successful year yet.
Snowflake has announced its new cybersecurity workload, allowing security products and security teams to use the Snowflake data cloud with the same rich capabilities that data analysts enjoy. The launch redefines B2B SaaS says Snowflake head of cybersecurity Omer Singer, bringing the work to your data rather than spreading your data across your apps.
Password manager LastPass has announced that customers can now access their vault, and all sites stored in it, with a “simple and secure passwordless” login using the LastPass Authenticator.
Cyber criminals pivoted to unconventional people-focused attack methods last year, including 100,000 daily smartphone attacks and double the amount of smishing (phishing cybersecurity attacks over mobile text messaging) attempts year-over-year, according to cybersecurity firm Proofpoint’s latest The Human Factor report.
GUEST OPINION: Cybersecurity is a complex business and focusing on integrated solutions instead of product sales makes a big difference for customers.
GUEST OPINION: Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), conducted new research into the talent shortage afflicting the cybersecurity industry. Among the key findings, 85% of those surveyed believe the workforce shortage is impacting their organisations’ abilities to secure increasingly complex information systems and networks. Of the current workforce, 30% plan to change professions in the future.
New research shows over half of businesses struggle to reduce the risk of attacks, leaving them fearful of compromise, particularly by nation-states and other types of threat actors. The study also predicts this situation will continue if critical cybersecurity skills shortages aren’t addressed, and if organisations do not employ detection technologies that are effective in production, provide real-time visibility, and integrate with existing tools and processes.
New research shows over half of businesses struggle to reduce the risk of attacks, leaving them fearful of compromise, particularly by nation-states and other types of threat actors. The study also predicts this situation will continue if critical cybersecurity skills shortages aren’t addressed, and if organisations do not employ detection technologies that are effective in production, provide real-time visibility, and integrate with existing tools and processes.
A new centre dedicated to helping NSW small businesses respond to cybersecurity incidents and strengthen their cybercrime capabilities has opened at Western Sydney University.
With 95% of cybersecurity breaches being caused by human error, alongside zero-days, sophisticated hacks, spear fishing, social engineering and more, Ben Jones explains the state of play in today's world of cybersecurity, and his partnership with famous White House hacker/prankster James Linton.
With 95% of cybersecurity breaches being caused by human error, alongside zero-days, sophisticated hacks, spear fishing, social engineering and more, Ben Jones explains the state of play in today's world of cybersecurity, and his partnership with famous White House hacker/prankster James Linton.
Cybersecurity and compliance company Proofpoint has released its annual Voice of the CISO report, which explores key challenges facing chief information security officers (CISOs) in Australia and around the globe.
What about all the customers they turned away and refused to fix their phones due to 'water damage'. I had[…]
....and Australia is no where to been seen...
Exactly. And the source document makes it clear that Assange is being pursued for his alleged involvement in the hacking,[…]
You can believe whatever you want. The source document is there for people to see the facts.
But Sam, you’ve just proved my point. The indictment “stems from” the publication of the material but it includes a[…]