Displaying items by tag: Cyber threats

GUEST OPINION:  Cybercriminals are constantly on the hunt for new ways to gain access to corporate IT infrastructures. Increasingly, their targets of choice are identity and privilege.

Published in Security

Advanced suite of AI security capabilities provides an easy, safe, and reliable way for companies of all sizes to protect AI model deployment, data, and integrity

Published in Data
Monday, 24 March 2025 10:16

AI in Cybersecurity — Friend or Foe?

GUEST OPINION:  The cybersecurity landscape in Australia has evolved dramatically. Gone are the days when simple firewalls and antivirus software could keep our digital assets safe. In FY24, the Australian Signals Directorate (ASD) received a total of 87,000 cybercrime reports. This meant one cybercrime was reported every six minutes on average.

Published in Guest Opinion

GUEST OPINION:  Derek Hanson, Vice President of Standards and Alliances at Yubico :  In today’s digital landscape, cyber threats are evolving at an unprecedented pace: every second, a phishing attack takes place. In fact, over 80% of these attacks are the result of stolen login credentials and almost 70% of phishing attacks relied on AI last year alone.

Published in Security

8th Annual Year in Review Names Two New OT Cyber Threat Groups, Ongoing Infiltration by VOLTZITE, and Global Threat from FrostyGoop Malware

Published in Security

GUEST RESEARCH:  The latest Nozomi Networks Labs OT & IoT Security Report released today finds wireless networks woefully unprotected as threat actors continue to gain deep access into critical infrastructure. In the 2nd half of last year, critical infrastructure organisations in the United States saw the highest number of attacks, with manufacturing at highest risk.

Published in Security

Mutual customers will benefit from boosted endpoint threat detection and response capabilities

Published in Deals

As industrial networks expand into wireless domains, new vulnerabilities are exposing critical infrastructure to potential cyber threats. With this evolution, safeguarding wireless devices within industrial settings has become essential. Since the launch of Guardian Air, Nozomi Networks has emphasised the need for stronger protections, particularly on wireless fronts.

Published in Software

Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration.

COMPANY NEWS: To help organisations achieve phishing-resistance at scale, we recently announced  the general availability of  Yubico Enrollment Suite – a set of offerings that includes Yubico FIDO Pre-reg and the brand new YubiEnroll – which delivers choice to enterprises in how they fast-track to a phishing-resistant stance and go passwordless by pre-enrolling YubiKeys with their Identity Platform (IdP) before delivering to end users.

Published in Security

Singaporean telecommunications company Singtel has announced that it will be enhancing its suite of quantum-safe offerings to help enterprises fortify their defenses against cyber threats and scale more securely in the quantum age.

Published in Telecoms & NBN

GUEST OPINION by Chaim Mazal, Chief Security Officer of Gigamon: Global events are particularly vulnerable due to the rise of geopolitical tensions. Whenever nation-states have a reason to stir the pot, it is essential to take extra precautions. Furthermore, in the last 12 months, only 1 in 3 organisations were able to detect they’d been breached, which is particularly concerning amid the Olympic organising committee’s announcement that cyber threats will increase tenfold this summer.

So where does the risk arise? One area, in particular, is from cloud-based streaming services. In a new era of live TV, enabling viewers to watch on-demand on any device in any location, bringing additional traffic to the organisation’s networks when viewed on a work device or network. However, with any cloud-based service comes risk.

All cloud traffic is automatically encrypted and despite its good intent to keep data safe, research has found that 93% of malware hides behind encrypted traffic. Once a threat actor breaches perimeter security, they hide behind encrypted traffic for weeks or even months making visibility into all network traffic essential. This includes North to South traffic – traffic that flows from outside to inside an organisation and East to West traffic – traffic traversing laterally within the organisation enabling threat actors to hide and locate sensitive data wherever it may live in the network.

An example of how this could play out is through social engineering techniques where a threat actor may leverage a phishing campaign to manipulate a user to click a link to watch highlights from a team or athlete's latest routine/match etc.

In reality, once clicked it opens the door to the user's information and potentially many doors after that, including their company’s network the next time they log into its virtual private network (VPN) or access the company’s Wi-Fi. When it comes down to it, risk is inevitable, however, visibility into all data in motion can be the difference maker between a bad actor walking away with highly sensitive data or being caught in their tracks before successful exfiltration.

Published in Guest Opinion

Zscaler Copilot, Advanced by NVIDIA AI Enterprise, Delivers Security Controls to Proactively Defend Against New Cyber Threats

COMPANY NEWS: Zscaler, Inc. (NASDAQ: ZS), a leader in cloud security, today announced a collaboration with NVIDIA to accelerate AI-powered copilot technologies. Zscaler will leverage NVIDIA AI technologies to deliver new user experience and security-centric copilot services to the enterprise. The introduction of new AI capabilities, leveraging NVIDIA NIM inference microservices, NVIDIA NeMo Guardrails, and the NVIDIA Morpheus framework, will dramatically increase the ability to process data from the Zero Trust Exchange™ platform, further enhancing Zscaler copilot’s ability to proactively defend enterprises against cyber threats and simplify IT and network operations.

Published in Resellers

Cybersecurity solutions distributor Satcom Infotech has announced a strategic partnership with global Zero Trust Edge cloud security provider. iboss.

Published in Security

In 2024, 61% of Australian Chief Information Security Officers (CISOs) surveyed feel at risk of experiencing a material cyber attack in the next 12 months, compared to 53% in 2023.

Published in Security

This year’s World Backup Day on 31 March serves as a timely reminder for organisations to “up their data protection game” by having the right recovery and ransomware protection capabilities, according to the latest protection trends report from Veeam.

Published in Security

GUEST RESEARCH :  94% of Australian IT decision makers believe sharing information would benefit their organisation

Published in Data

Latest round includes investments from Mitsubishi Electric and Schneider Electric; spotlights demand for an OT/IoT security platform that supports heterogeneous operating environments

Published in Security
Wednesday, 14 February 2024 15:38

Nozomi welcomes Government actions on Medibank hack

GUEST OPINION by Anthony Stitt, Nozomi: Cyber and threat intel company Nozomi Networks says sanctions imposed on a Russian individual responsible for the Medibank hack represent a “welcome focus” away from victim blaming in the event of a cyber attack.

Published in Guest Opinion

Industries most targeted by cyberattacks in Australia during the third quarter of 2023 include telecommunications, Internet, Information Technology and Services, computer software, and marketing and advertising, according to one security firm which says it blocked an average of 350 million cyber threats targetting Australia per day in the quarter.

Published in Security
Page 1 of 5

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments