Zero Trust segmentation provider Illumio has announced a new Technology Alliance Partner Program (TAP).
This is part three of a three part video series and discussion on Australia's cybersecurity legislation, looking at the Federal Australian Government’s mandatory data retention laws.
The first in a three part discussion on Australia's cybersecurity legislation covering changes to critical infrastructure laws, surveillance laws and mandatory data retention laws has been published by Peter Coroneos, the International Vice President of CyAN, the Cybersecurity Advisors Network.
Brisbane-based digital engineering SaaS provider RedEye has integrated with Microsoft in a move they say is designed to unlock safety and efficiency improvements for the world’s critical assets and infrastructure.
The Critical Infrastructure Bill, introduced by the Minister for Home Affairs, Peter Dutton MP, will recognise telecommunications and data centres as critical national infrastructure for the first time.
The Australian Information and Industry Association has cautioned the Federal Government against rushing through its draft bill on protecting critical infrastructure, recommending that there be more consultation in order to get details of the law right.
Telecoms lobby group and peak industry body Communications Alliance has called on government to work together with the telecommunications industry to advance sector-specific critical infrastructure reforms.
The Australian Government is investing $1.67 billion in its 2020 cyber security strategy which it says will protect and strengthen the security and resilience of Australia’s critical infrastructure, and ensure law enforcement agencies have the powers and technical capabilities to detect, target, investigate and disrupt cyber crime – including on the dark Web.
GUEST CONTRIBUTION by Adam Fuoss*, vice president technical sales Silver Peak: Implementing SD-WAN is hard. Among the promise and hype of automation, dynamic path selection, zero-touch provisioning and a cloud-ready WAN, lies a trail of failed SD-WAN projects. Others are struggling on life support.
GUEST CONTRIBUTION* by Adam Fuoss, vice president technical sales Silver Peak: Implementing SD-WAN is hard. Among the promise and hype of automation, dynamic path selection, zero-touch provisioning and a cloud-ready WAN, lies a trail of failed SD-WAN projects. Others are struggling on life support.
Forcepoint says its new Critical Infrastructure business unit will "address the challenge of balancing insider threat detection and data security with availability for industrial control systems and industrial IoT connected devices".
The federal government has issued a draft of a bill that, if passed, would allow it to insist that private companies in the power, water, and ports sectors take action to remediate a significant national-security risk.
Eugene Kaspersky, founder of the anti-virus/malware/cyber security company of the same name started his keynote speech at CeBIT with the old “good and bad news” gambit.
A major cyber security innovation summit was held in Canberra today, bringing together ‘an influential group of public sector executives and security leaders from around the world to discuss the leading trends in technology.’
Internet security company Check Point Software has expansion plans in mind as the market and the IoT revolution grows, with its list of 2015 trends and threats one to watch.
In April this year, a vulnerability was discovered in a commonly used critical infrastructure Web Access product. Exploitable code was also made available. The manufacturer has announced that no patch will be released.
Reports in the past day have identified a new virus directly targeting Iranian infrastructure.
According to the latest survey, private sector critical infrastructure all around the world is concerned about cyber threats but not well-prepared to deal with them.
Yesterday the Internet was a-buzz with tales of a hacker shutting down a US-based wind farm. Pity it never happened.
Today's release of the report "In the Crossfire: Critical Infrastructure in the Age of Cyberwar" by McAfee Inc. paints a very grim picture of a perpetual war in cyberspace
NetComm was given an early Mac by Apple in 1984. I set about developing a NetComm program for it, and[…]
A partial victory indeed. Meanwhile Julian Assange is still stuck in gaol while lawyers and activists feast on his discomfort.[…]
Yes indeed, unwelcome scam calls are on the rise!add trojan and phishing links in unsolicited SMS to that list :)Interesting,[…]
the G-sync compatible TV is great but I wanted to read more on the LG Rolling Bot to see if[…]
I purchased a NOVOO USB C Hub 8 in 1 USB-C Dock back in 2020 for my Dell XPS-15 when[…]