Displaying items by tag: Hackers

The social media site Twitter has once again shown it has somewhat twisted priorities by taking down the account of Swiss IT consultant and developer Tillie Kottmann who exposed consultancy firm Deloitte's lack of technical nous.

Published in Open Sauce

GUEST OPINION by Ashley Diffey, Ping Identity Country Manager Australia, New Zealand and Japan: Since the early days of the information technology revolution, the task of ensuring effective digital security has relied on the humble password. Used to confirm an individual’s identity, they’ve acted as the keys to vital systems and data stores.

Published in Guest Opinion

iTWire recently had an opportunity to chat with Gilad Bandel, VP Product and Marketing at Arilou Automotive Cyber-Security.

Published in Security
Thursday, 03 September 2020 22:50

Beware - excessive permissions are the #1 cloud threat

GUEST OPINION by Eyal Arazi, Radware: Migrating workloads to public cloud environment opens up organisations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centres.

Thursday, 03 September 2020 22:39

Beware - excessive permissions are the #1 cloud threat

GUEST OPINION by Eyal Arazi, Radware: Migrating workloads to public cloud environment opens up organisations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centres.

Published in Cloud

GUEST OPINION by Greg Wyman, Bufferzone Security:  The world of cyber security has become increasingly complex in past years. Endpoints continue to be the vector that most attackers and hackers use to breach an organisation.

GUEST OPINION by Greg Wyman, Bufferzone Security:  The world of cyber security has become increasingly complex in past years. Endpoints continue to be the vector that most attackers and hackers use to breach an organisation.

Published in Security
Wednesday, 15 July 2020 15:05

How Hackers Can Abuse Contact Tracing Apps

By ProPrivacy

VENDOR PROMOTION Contact tracing apps could do a lot of good, but not if hackers get in the way. Here’s a quick list of three ways cybercriminals can abuse these apps.

Published in Guest Opinion
Wednesday, 15 July 2020 13:56

How Hackers Can Abuse Contact Tracing Apps

VENDOR PROMOTION Contact tracing apps could do a lot of good, but not if hackers get in the way. Here’s a quick list of three ways cybercriminals can abuse these apps.

Published in Security
Wednesday, 08 July 2020 10:05

Cloudian launches operations in Australia, NZ

Object storage specialist provider Cloudian has officially launched operations in Australia and New Zealand, in a move it says is aimed at capitalising on the local need to manage, protect and leverage massive data sets without sacrificing ease-of-access.

Published in Guest Opinion

Veteran vulnerability researcher Dave Aitel has offered his views on a major flaw in the BIG-IP range of devices, saying that the fact many people had assumed it had never been found and exploited could well be incorrect.

Published in Security

VENDOR CONTRIBUTION: Layer 1 (the physical layer) encryption is an important part of the total cyber-security solution in DWDM and OTN Networks.

VENDOR CONTRIBUTION: Layer 1 (the physical layer) encryption is an important part of the total cyber-security solution in DWDM and OTN Networks.

Published in Security

The Girl Geek Academy’s flagship program #SheHacks, which launched as a global first in 2014, is now running statewide across Victoria in 2020 from February to April.

Published in Security

Organisations in Australia say that more than 76% of their IT infrastructure will be operating in the public cloud over the next five years, an increase from almost 45% currently - but security concerns are slated as restricting public cloud adoption, according to a new study.

Published in Cloud
Thursday, 20 February 2020 17:31

2020 predictions: Dave Weinstein, CSO, Claroty

GUEST OPINION By Dave Weinstein Claroty: From a threat perspective, I expect to see a continuum from 2019 into 2020, as it is getting easier for hackers to attack these systems because they’re more exposed to the public internet. Not just nation state hackers, but criminal hackers who are financially motivated.

Thursday, 20 February 2020 16:45

2020 predictions: Dave Weinstein, CSO, Claroty

GUEST OPINION. From a threat perspective, I expect to see a continuum from 2019 into 2020, as it is getting easier for hackers to attack these systems because they’re more exposed to the public internet. Not just nation state hackers, but criminal hackers who are financially motivated.

Published in Security

Global email and data security company Mimecast has acquired digital threat protection vendor Segasec.

Published in Security

Global credit bureau services provider Experian has launched its proprietary internet surveillance technology CyberAgent in Australia and New Zealand.

Published in Market

The AustCyber Canberra Cyber Security Innovation Node has partnered with the Australian Federal Police, the National Missing Persons Coordination Centre and Trace Labs to deliver Australia’s first large scale national missing persons hackathon in Canberra, Sydney, Brisbane, Gold Coast, Sunshine Coast, Darwin, Perth, Adelaide, Melbourne and Perth.

Published in Strategy

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments