GUEST OPINION: The workplace is undergoing a profound transformation driven by the rapid adoption of AI. We are on the brink of one of the largest change management exercises in history, and every business leader and professional needs to embrace this shift to unlock AI's full potential and ensure organisations and employees aren’t left behind.
Latest Fastly Bot Management update reduces CAPTCHA reliance, enhances bot detection, and highlights compromised credentials
In the current digital landscape, online privacy is more crucial than ever. Intrusive tracking and data leakage have never made a reliable VPN more critical. Finding a cost-effective solution that protects your data without sacrificing functionality could be complex. Many low-cost VPNs take quick cuts, which leads to laggy connections or insufficient security, making them unfit for everyday use. The secret is to strike a balance between price, security, and performance while ensuring the VPN you select offers complete protection. When choosing an affordable VPN, essential factors include security features, performance, and user recommendations.
GUEST OPINION: Cyber resilience is often discussed in theoretical terms – plans, frameworks, and protocols designed to respond to threats. However, when a real crisis hits, theory alone won’t keep a business running.
Australia is facing a higher rate of cyber threats, with attacks across the Asia-Pacific region 60% higher than the global average, according to Check Point’s Threat Intelligence data.
Positioned highest for Ability to Execute and furthest for Completeness of Vision
Ransomware threats increased fourfold during 2024, likely driven by prolific Ransomware-as-a-Service (RaaS) activity, according to Barracuda’s annual review of XDR detection and incident data. Email threats that made it through to user inboxes were the fifth most detected threat overall, highlighting the growing risk of sophisticated and evasive attacks enabled by Phishing-as-a-Service (PhaaS) platforms.
mROC, powered by Qualys Enterprise TruRisk™ Management, accelerates revenue paths for partners helping CISOs articulate cyber risk as business risk
GUEST RESEACH: “State of CPS Security 2025: OT Exposures” Reveals the OT Device Exposures Most Coveted for Exploitation by Adversaries
New Updates Help Organisations Defend Against Modern Cyberattacks With Robust Email Security That Is Easy to Buy, Deploy, and Use
Cybersecurity company BlueVoyant has announced the appointment of Rob Joyce as an independent director on its board.
GUEST OPINION: Now we’ve reached the end of another year, you may be looking around the cybersecurity infosphere and seeing a glut of posts offering “hot takes” on the 2024 threat landscape and predictions about what’s coming next. At Rapid7, we don’t truck in hot takes, but rather, cold hard facts. Staying ahead of adversaries requires more than just advanced tools; it requires the latest intelligence and collaborative insights from experts working from data that tells the whole story.
GUEST OPINION:
COMPANY NEWS: Check Point Software 2025 Cyber Security Predictions reveal how emerging technologies and advanced cyber criminal tactics will reshape the global threat landscape
Barracuda threat intelligence researchers have detected more than half a million phishing emails with quick response (QR) codes embedded in PDF documents.
QR codes that lead to phishing websites are now being included in PDF documents and attached to emails — versus being included in the emails themselves.
The attacks are designed to capture login credentials for compromise.
GUEST OPINION: Artificial Intelligence (AI) is rapidly becoming an important of business strategy, promising increased efficiency, reduced costs, and innovative solutions. As with the use of any new technology, comes the risks associated with the use of the technology.
Security Operations Leader Arctic Wolf will Provide Tecala Customers Industry-Leading Capabilities to Tackle the Increasing Dangers of Advanced Cyberattacks
Insider threats, malicious activities perpetrated by individuals with legitimate access to an organisation's systems, pose a significant risk to information security.
GUEST OPINON: The financial services industry is undergoing a digital revolution, and customers now expect seamless, secure, and personalised experiences across all channels.
KnowBe4 releases a free resource kit for cybersecurity awareness month to help organisations manage cyberattacks
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]