... Enron, even Martha Stewart.
Why is it the case then that cyberattacks, perhaps the most prolific modern day white-collar crime, often go under the radar.
While white-collar crime is a broad category ...
Industry-First Solution Sets a New Standard for Attack Surface Reduction and Endpoint Security Through Dynamic, User-Tailored Protection
Bitdefender, a global cybersecurity leader, today announced ...
GUEST RESEARCH: Data sprawl drives spike in cyber incidents across AI, cloud, SaaS, and on-premise environments, according to Rubrik Zero Labs Report
New research from Rubrik Zero Labs finds that ...
... cyber threats. Cybersecurity challenges remain prevalent across Asia Pacific with 91 percent of organisations surveyed in the Logicalis APAC CIO report, citing cybersecurity incidents in the last 12 ...
COMPANY ANNOUNCEMENT: Expanded guarantees give enterprises greater control, faster recovery from cyber threats and lower energy costs
Hitachi Vantara, the data storage, infrastructure and hybrid ...
... the launch of NHI Governance. This innovative new product addresses the most critical blind spot in modern cybersecurity: the security and management of Non-Human Identities (NHIs) and their associated ...
... connects the dots and finds every needle in every haystack. When integrated with Illumio Segmentation, breaches are contained and cyber disasters avoided.”
Illumio’s AI security graph enables Insights ...
COMPANY NEWS by Kash Sharma, Managing Director, ANZ, BlueVoyant:The recently reported cyber incident involving Hertz Australia, where customer data has been compromised after a third-party breach, serves ...
GUEST OPINION: In cybersecurity marketing, your expertise isn’t just valuable—it’s one of your most powerful selling tools in your arsenal. While other industries might be able to sit back and rely on ...
CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced the availability of CyberArk Secure Workload Access Solution1 delivering the industry's most comprehensive protection for ...
...
Cyberbreaches are not an isolated event—the Office of the Australian Information Commissioner (OAIC) reported 527 data breach notifications from January to June 2024 alone, with cybersecurity incidents ...
COMPANY NEWS: In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account ...
... and monitoring, organizations can significantly reduce security risks.
The Emerging Significance of Identity Security
Cyber attackers increasingly rely on stolen credentials to gain unauthorized access ...
Shadow IT, the use of unauthorized applications and devices within an organization can cause significant cybersecurity threats, including increased risk of data breaches, compliance violations, and expanded ...
... time where deepfakes, synthetic identities, and sophisticated cyberattacks are rife, which makes safeguarding credentials and personal information more critical than ever.
With people remaining the ...
GUEST RESEARCH: Semperis, a leader in AI-powered identity security and cyber resilience, today published the results of a new study looking at cyberattacks against water and electricity operators across ...
GUEST OPINION: Cybercriminals are constantly on the hunt for new ways to gain access to corporate IT infrastructures. Increasingly, their targets of choice are identity and privilege.
They are attempting ...
... changes in the business landscape, including more sophisticated cyber threats, the rise of distributed work, and smartphone saturation," she said.
Amid all this change, two constants emerged from ...
In a groundbreaking move to redefine cyber resilience, Commvault and SimSpace have unveiled the Commvault Recovery Range, a first-of-its-kind cyber range that seamlessly integrates real-world attack simulations ...
Cyber defence and advisory services firm Slipstream Cyber has opened its new office in Perth in a ribbon-cutting ceremony officiated by Stephen Dawson, Minister for Science and Innovation.
Slipstream ...
GUEST OPINION by Chris Fisher, Regional Director of Australia and New Zealand, Vectra AI: Cybersecurity stands at a fascinating crossroads today, with artificial intelligence (AI) revolutionising the field, ...
Cyberint, rebranded as Check Point External Risk Management, offers a comprehensive view of an organization's cyber threats across the open, deep, and dark web
Check Point Software Technologies Ltd. ...
... allow attackers to:
Inspect private container images, extracting sensitive information or secrets.
Modify deployment parameters to execute unauthorised code.
Exfiltrate critical data for cyberespionage ...
... face cybersecurity risks as medical technology becomes more integrated.
Many healthcare IT teams struggle to track and manage all connected devices within their networks. Hospitals often rely on legacy ...
... students in addition to thousands of support staff, was playing “wack a mole” with its cybersecurity strategy and chasing every vulnerability.
The data breach emphasised the need to take a more strategic ...
GUEST OPINION: Society is now at the stage where cybercriminals can easily leverage artificial intelligence (AI) to send hyper-personalised phishing emails that look like they’re from trusted sources, ...
New KnowBe4 research finds local IT leaders are seeking increased information sharing from government
As cyber-attacks and data breaches continue to wreak havoc with organisations around the world, IT ...
... Cost of Ransomware Study here or check out the blog here.
Research Methodology The research was conducted by Ponemon Institute on behalf of Illumio among 2,547 IT and cybersecurity practitioners in ...
GUEST OPINION: Charles Chu, General Manager, IT and Developer Solutions, CyberArk: World Cloud Security Day is a timely reminder for organisations to assess how robust their cloud identity security posture ...
... model, assuming cloud providers fully protect their data. Unfortunately, this misconception leaves organisations vulnerable to cyberattacks.
Given that AI-powered attacks are on the rise, businesses ...
... fragmented data. In a press release titled "Gartner Identifies the Top Cybersecurity Trends for 2025" (issued March 3, 2025), Gartner highlights a common challenge for large enterprises: the need to optimise ...
Six preparedness and performance indicators to unlock cyber agility
By John Penn, Security Propositions Architect at BT: The rapidly evolving cyber-risk landscape sees a cyber attack every six minutes ...
... just us, it’s businesses too.
Cyber crime is in vogue these days. An IBM report stated that the average breach cost for Australian businesses has risen to $4.26 million, a 27% increase since 2020. ...
... they inevitably become prime targets for various cyber threats. These threats include data breaches, where unauthorised individuals access confidential information; adversarial attacks, in which malicious ...
... can leverage AI technology without the need for massive investments. As AI experimentation becomes increasingly widespread, new risks emerge–cybercriminals are targeting AI applications, while security ...
In today’s interconnected world, cybersecurity is no longer a luxury; it is a necessity. For small and medium businesses (SMBs), protecting digital assets has become one of the most pressing challenges. ...
... has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data exfiltration. This shift to ransomware marks a significant evolution ...
GUEST RESEARCH: The newly published report harnesses data from Trend’s platform insights on cyber risk.
Trend Micro Incorporated, a global cybersecurity leader, today revealed a continued annual decline ...
Cybersecurity and compliance company Proofpoint Inc. today has expanded its global partnership with Microsoft that leverages Microsoft Azure’s robust AI capabilities and “trusted cloud infrastructure to ...
... businesses fight back against account takeover and credential stuffing attacks. Cybercriminals exploit stolen credentials from data breaches and leaked databases to gain unauthorised access to user accounts. ...
GUEST OPINION: Virtual private networks (VPNs) are known for protecting online privacy, but they might not be the best solution in every situation. The encryption provided by VPNs and their capability ...
... data. Progress and growth strategies must be aligned with defense against growing cyber threats.
Cyber threat intelligence (CTI) and threat detection have emerged as essential strategies for proactively ...
GUEST OPINION: In an era where data is the new currency, identity theft has evolved into one of the most pressing concerns of the digital age. Everyday, millions of individuals fall victim to cybercriminals ...
... amounts of sensitive data, they inevitably become prime targets for various cyber threats. These threats include data breaches, where unauthorised individuals access confidential information; adversarial ...
GUEST RESEARCH: Most educational institutions lack resources for robust and comprehensive cybersecurity programs
KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human ...
As the threat landscape continuously evolves, the call for robust data security solutions has never been more urgent. Today, Rubrik (NYSE: RBRK), a leading cyber security company, is proud to announce ...
GUEST OPINION: Australia’s healthcare sector is consistently targeted by cybercriminals, having reported the highest number of data breaches from all Australian sectors over the last five years, according ...
... ransomware attack against one of the largest healthcare providers a little more than one year ago, highlights the importance of cyber resiliency. As organisations face sophisticated threats growing in ...
... shape their organisations' futures. From leveraging artificial intelligence (AI) and optimising cybersecurity investments to integrating sustainability initiatives for commercial advantage, CIOs are now ...