Enhancing Threat Intelligence and Threat Detection in Australian Central Government Organisations
GUEST OPINION by Cyrille Badeau, Vice-President of International Sales, at ThreatQuotient: In an era where digital frontiers are continuously expanding and evolving, adaptability is critical for Federal, State, and Local Government Departments, and Agencies to secure their infrastructure and sensitive data. Progress and growth strategies must be aligned with defense against growing cyber threats.
GUEST INTERVIEW: CJ Moses moves out of the shadows to discuss day-to-day issues at one of the world’s most scrutinised companies
GUEST INTERVIEW: iTWire talks to Google Cloud Security's Head of SecOps, Peter Bailey, and learns how Google's platform can help other organisations run their own security operations and monitor threat intelligence.
New feature accelerates threat management by enabling better web reputation visibility, threat detection and automated threat response
Cybersecurity company Trellix reports that it has detected indicators of collaboration between ransomware groups and nation-state-backed advanced persistent threat (APT) actors, adoption and usage of lesser-known programming languages for malware, and cybercriminals developing Generative AI (GenAI) tools.
GUEST RESEARCH: Cado Security, provider of the first cloud forensics and incident response platform, today announced the release of Cado Security Labs 2023 Cloud Threat Findings Report. The report reveals noteworthy discoveries about the evolving cloud threat landscape, shedding light on the heightened risk of cyberattacks due to the rapid adoption of cloud-focused services.
Cyber security firm Group-IB claims to have discovered credentials for compromised ChatGPT accounts in the logs of info-stealing malware traded on the dark web. A total of 101,134 hosts were found to be hosting these credentials.
COMPANY NEWS: Check Point Software Technologies, a leading provider of cyber security solutions globally, has been named a Leader in The Forrester Wave: Enterprise Email Security, Q2 2023 report. In its inaugural debut in the Forrester Wave, Check Point Harmony Email & Collaboration secured a position as a leader.
GUEST OPINION: It's currently one of the hottest topics in IT security circles, however it can be challenging to find two vendors that describe it in the same way.
GUEST OPINION: Distributed denial of service (DDoS) attacks have become a major threat to a wide variety of businesses, from the smallest to the largest multi-national corporations.
GUEST INTERVIEW: Alex Tilley speaks with iTWireTV on the topic of building a security culture in your business, what companies are doing wrong in this area, and how to do it right. Cybersecurity comes down to every individual, and a positive, supportive security culture can make all the difference.
Reflecting real world events and geopolitical tensions, the PwC Cyber Threats report is a deep dive analysis by PwC’s Global Threat Intelligence (GTI) team of cyber incidents, cybercriminal ecosystem shifts, attack insights and trends, and how to use this knowledge to support cyber resilience.
GUEST OPINION: Security Information and Event Management (SIEM) was created nearly two decades ago. Back then, organizations already had the means to detect threats and gather relevant information, but they lacked the efficiency in analyzing and responding to these threats. SIEM provided a solution to systematize the handling of security data and events.
COMPANY NEWS: Taiwan-based threat intelligence company TeamT5, which became active in Australia late last year, is confident that its specialist knowledge will benefit ANZ organisations.
COMPANY NEWS: ExtraHop, the leader in cloud-native network intelligence, has announced a new integration between Reveal(x), its network detection and response (NDR) platform, and Splunk SOAR. Using the Reveal(x) integration, Splunk SOAR users now have expanded visibility with packet-level insights from IoT to the cloud including unmanaged devices, legacy systems, and all network assets. Users can correlate logs with network intelligence to gain a greater understanding of threats and more confidence in automation of tier 1 and tier 2 incident response.
Analyst firm Gartner has identified three factors influencing growth in security spending.
COMPANY NEWS: Nozomi Networks, the leader in OT & IoT security today announced its Threat Intelligence is now available for use with third-party cybersecurity platforms. Previously only available for use with Nozomi Networks Guardian and Vantage products, now other cybersecurity platforms can leverage the same Nozomi Networks research and intelligence to improve defences against recent and emerging OT, IoT, phishing and ransomware threats.
GUEST RESEARCH: Radware, a leading provider of cyber security and application delivery solutions, has published results from its Q3 DDoS and Application Attack Report.
Ransomware has emerged as one of the defining cybersecurity threats of 2021, witth attacks increasing tenfold over the past year and the trend set to continue as cyberattackers see lucrative paydays from ransomware operations.
Gobal Intelligence-driven cyber solutions provider Anomali has announced a partnership with Australian threat intelligence company Cybermerc.
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]
I wonder when they will implement all of this, and what the pricing plans will be.FWIW, these days the proposed[…]