GUEST OPINION: Cybercriminals are constantly on the hunt for new ways to gain access to corporate IT infrastructures. Increasingly, their targets of choice are identity and privilege.
Advanced suite of AI security capabilities provides an easy, safe, and reliable way for companies of all sizes to protect AI model deployment, data, and integrity
GUEST OPINION: The cybersecurity landscape in Australia has evolved dramatically. Gone are the days when simple firewalls and antivirus software could keep our digital assets safe. In FY24, the Australian Signals Directorate (ASD) received a total of 87,000 cybercrime reports. This meant one cybercrime was reported every six minutes on average.
GUEST OPINION: Derek Hanson, Vice President of Standards and Alliances at Yubico : In today’s digital landscape, cyber threats are evolving at an unprecedented pace: every second, a phishing attack takes place. In fact, over 80% of these attacks are the result of stolen login credentials and almost 70% of phishing attacks relied on AI last year alone.
8th Annual Year in Review Names Two New OT Cyber Threat Groups, Ongoing Infiltration by VOLTZITE, and Global Threat from FrostyGoop Malware
GUEST RESEARCH: The latest Nozomi Networks Labs OT & IoT Security Report released today finds wireless networks woefully unprotected as threat actors continue to gain deep access into critical infrastructure. In the 2nd half of last year, critical infrastructure organisations in the United States saw the highest number of attacks, with manufacturing at highest risk.
Mutual customers will benefit from boosted endpoint threat detection and response capabilities
As industrial networks expand into wireless domains, new vulnerabilities are exposing critical infrastructure to potential cyber threats. With this evolution, safeguarding wireless devices within industrial settings has become essential. Since the launch of Guardian Air, Nozomi Networks has emphasised the need for stronger protections, particularly on wireless fronts.
Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration.
COMPANY NEWS: To help organisations achieve phishing-resistance at scale, we recently announced the general availability of Yubico Enrollment Suite – a set of offerings that includes Yubico FIDO Pre-reg and the brand new YubiEnroll – which delivers choice to enterprises in how they fast-track to a phishing-resistant stance and go passwordless by pre-enrolling YubiKeys with their Identity Platform (IdP) before delivering to end users.
Singaporean telecommunications company Singtel has announced that it will be enhancing its suite of quantum-safe offerings to help enterprises fortify their defenses against cyber threats and scale more securely in the quantum age.
GUEST OPINION by Chaim Mazal, Chief Security Officer of Gigamon: Global events are particularly vulnerable due to the rise of geopolitical tensions. Whenever nation-states have a reason to stir the pot, it is essential to take extra precautions. Furthermore, in the last 12 months, only 1 in 3 organisations were able to detect they’d been breached, which is particularly concerning amid the Olympic organising committee’s announcement that cyber threats will increase tenfold this summer.
So where does the risk arise? One area, in particular, is from cloud-based streaming services. In a new era of live TV, enabling viewers to watch on-demand on any device in any location, bringing additional traffic to the organisation’s networks when viewed on a work device or network. However, with any cloud-based service comes risk.
All cloud traffic is automatically encrypted and despite its good intent to keep data safe, research has found that 93% of malware hides behind encrypted traffic. Once a threat actor breaches perimeter security, they hide behind encrypted traffic for weeks or even months making visibility into all network traffic essential. This includes North to South traffic – traffic that flows from outside to inside an organisation and East to West traffic – traffic traversing laterally within the organisation enabling threat actors to hide and locate sensitive data wherever it may live in the network.
An example of how this could play out is through social engineering techniques where a threat actor may leverage a phishing campaign to manipulate a user to click a link to watch highlights from a team or athlete's latest routine/match etc.
In reality, once clicked it opens the door to the user's information and potentially many doors after that, including their company’s network the next time they log into its virtual private network (VPN) or access the company’s Wi-Fi. When it comes down to it, risk is inevitable, however, visibility into all data in motion can be the difference maker between a bad actor walking away with highly sensitive data or being caught in their tracks before successful exfiltration.
Zscaler Copilot, Advanced by NVIDIA AI Enterprise, Delivers Security Controls to Proactively Defend Against New Cyber Threats
COMPANY NEWS: Zscaler, Inc. (NASDAQ: ZS), a leader in cloud security, today announced a collaboration with NVIDIA to accelerate AI-powered copilot technologies. Zscaler will leverage NVIDIA AI technologies to deliver new user experience and security-centric copilot services to the enterprise. The introduction of new AI capabilities, leveraging NVIDIA NIM inference microservices, NVIDIA NeMo Guardrails, and the NVIDIA Morpheus framework, will dramatically increase the ability to process data from the Zero Trust Exchange™ platform, further enhancing Zscaler copilot’s ability to proactively defend enterprises against cyber threats and simplify IT and network operations.
Cybersecurity solutions distributor Satcom Infotech has announced a strategic partnership with global Zero Trust Edge cloud security provider. iboss.
In 2024, 61% of Australian Chief Information Security Officers (CISOs) surveyed feel at risk of experiencing a material cyber attack in the next 12 months, compared to 53% in 2023.
This year’s World Backup Day on 31 March serves as a timely reminder for organisations to “up their data protection game” by having the right recovery and ransomware protection capabilities, according to the latest protection trends report from Veeam.
GUEST RESEARCH : 94% of Australian IT decision makers believe sharing information would benefit their organisation
Latest round includes investments from Mitsubishi Electric and Schneider Electric; spotlights demand for an OT/IoT security platform that supports heterogeneous operating environments
GUEST OPINION by Anthony Stitt, Nozomi: Cyber and threat intel company Nozomi Networks says sanctions imposed on a Russian individual responsible for the Medibank hack represent a “welcome focus” away from victim blaming in the event of a cyber attack.
Cloud cybersecurity company Cloudflare has appointed 25-year industry veteran Steve Bray as Head of Australia & New Zealand.
Industries most targeted by cyberattacks in Australia during the third quarter of 2023 include telecommunications, Internet, Information Technology and Services, computer software, and marketing and advertising, according to one security firm which says it blocked an average of 350 million cyber threats targetting Australia per day in the quarter.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]