Security risks, not only in owned infrastructure, but also from third-party devices that are connected to the network, are concerning 81% of telecoms professionals, according to global cloud security firm Thales.
COMPANY NEWS: BeyondTrust, the worldwide leader in intelligent identity and access security, has announced the company has achieved ISO 27001:2022 certification.
Expectations remain low with the upcoming Labor 2022-23 Budget relating to anything remotely actionable and useful when it comes to keeping Australians safe online..
GUEST OPINION: Software supply chain compromise is among the top five threats of most concern to Australian organisations
GUEST RESEARCH: Next gen document generation platform Templafy has released new research it says shows that today’s enterprises are suffering from a lack of content infrastructure, putting their business success and reputation at constant risk.
A large majority of Australian and New Zealand organisations were not adequately prepared for COVID-19 and fear the increased risk they are being exposed to through working from home and flexible work policies, according to newly published survey findings.
Infrastructure automation solutions provider Puppet has announced a malware scanner feature for newly published modules on its module marketplace, the Forge, in order to combat security risks and increase the security profile of customers using those modules.
GUEST OPINION by Yaniv Hoffman, Radware: With cloud-based applications come new security risks that require expertise which is typically scarce and that can delay application deployment and maintenance.
Australians are using work tools, including company-issued devices for personal matters, to a greater extent than their global counterparts while remote working during the COVID-19 pandemic, according to new research which labels the behaviour as a security risk.
Smart home devices and their apps represent a major weak link in the corporate cyber security chain as the lines between work and home life increasingly blur, according to one security firm that conducted a survey revealing 36% of Australian workers use personal devices to access corporate data – often via services and applications hosted in the cloud.
With many SMEs around Australia taking their businesses online or expanding their digital footprint, some may find themselves facing the risk of card payment disputes, chargebacks and fraud for the first time, according to payment provider Mastercard.
GUEST CONTRIBUTION by James Herrin VPN Reviews: In a world where pretty much every corporation, starting from Amazon and Google and to your local grocery store wants to know everything about you, it is inevitable that people become more mindful of their privacy and sore about its violations.
Australia will be awash with IoT devices in the next few years according to Palo Alto Networks which cites a new report forecasting that the global value of the Internet of Things (IoT) devices being used in homes globally reached more than US$1 billion in 2019 - and will reach US$5.3 billion by 2023.
Drones need to be treated as any other Internet of Thing devices, with software that gathers and stores sensitive information that needs to be protected, according to IT security company CyberArk Labs.
SMBs are the primary target for cyber attacks, yet most are unprepared and “severely underestimate their cyber security vulnerabilities” when it comes to cyber criminals and cyber security risks, according to research of the US market.
Australian ICT industry executives and their counterparts around the world believe mobile computing will raise cyber security risks for organisations, with artificial intelligence topping the list as the greatest security risk, according to a new report.
Growing business risks and regulatory minimum standards are driving massive growth in the spending on Internet of Things cyber security solutions, according to a newly released report.
Companies allowing their service providers to access or hold sensitive or confidential data are sitting on a cyber-security “time bomb” unless they take smart action to manage the risk of the providers suffering a data breach, according to an IT governance professional.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]