... the most informed cybersecurity experts in the information technology (IT) and security community.
With the alarming rise in online threats being top of mind for cyber professionals, we discussed some ...
COMPANY NEWS: Secureworks, a global leader in cybersecurity, published its latest analysis today from its Counter Threat Unit (CTU), revealing that Iranian threat group Cobalt Sapling, has re-emerged with ...
Post-quantum cybersecurity software provider QuSecure today announced it has signed a software distribution agreement with Arrow Electronics,, a value-added distributor.
QuSecure says that now QuProtect ...
... there is a pressing need for more cybersecurity awareness training. Staff need to understand the dangers that can be contained within emails and the steps that should be taken to minimise risks.
The ...
... rise in regulatory demands, and customers’ high expectations for digital experiences, it is urging fashion brands to strengthen their cyber defences and make Active Directory (AD) security a strategic ...
OT and IT security specialist Nozomi Networks has announced the Nozomi Arc OT and IoT endpoint security sensor, with automatic deployment across large numbers of sites and devices, and the ability to collect ...
... and significant savings from retiring legacy security solutions. Forrester's analysis of the benefits concluded that "Reveal(x)360 decreases time to threat detection by 83% and time to threat resolution ...
... and it is crucial it does so rapidly, securely, reliably, and cost-effectively. SonicWall has launched its remarkable Network Security services platform device, the NSsP 15700 firewall, which brings serious ...
Security intelligence company, LogRhythm has announced a series of expanded capabilities and integrations for its security operations solutions.
LogRhythm says the updates propel its ability to be ...
... to achieving efficiency dividends and improving prospects of a successful digital transformation, companies must also consider the cybersecurity implications of pursuing such a strategy.
For many organisations, ...
... poor security hygiene, low-skilled groups like the 8220 Gang are able to cause a significant impact to targeted systems."
Why it matters
• It is not the first time Redis is subject to exploit activity ...
... customers, they are also required to protect PII under the general data protection regulation (GDPR).
M-Files director of security and compliance Saara Hasu-Varttila said, “Businesses of all sizes have ...
... Cyber Security Centre (ACSC) reported a significant jump in the number and sophistication of cyber threats, receiving approximately 76,000 cybercrime reports, a 13 per cent increase from the previous financial ...
COMPANY NEWS: Cohesity, a leader in data management and data security, announced the appointment of Victor Keong as Field Chief Information Security Officer for Asia-Pacific & Japan. Victor will play a ...
GUEST OPINION The digital world is evolving quickly with artificial intelligence and quantum computing expected to soon become a reality. When it comes to cybersecurity, we cannot just sit back and wait ...
GUEST RESEARCH: The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape. Continuing ...
...
Software vendors are constantly releasing updates to their code designed to plug security holes and ward off attacks. However, unfortunately, many of their customers are failing to take advantage of ...
COMPANY NEWS: Rubrik, the zero trust data security company, today announced it has surpassed US$500 million in software subscription annual recurring revenue (ARR). Additionally, the company achieved a ...
GUEST OPINION by Michael Bovalino, ANZ Country Manager, LogRhythm: As they map out their plans for the year ahead, many corporate IT security teams are considering whether a zero-trust strategy will ...
... surface that makes it harder than ever to manage network security. There is no edge to protect anymore, making proactive protective action for every device, every cloud and every sensor an essential part ...
... on approximately 30 million devices worldwide.
2022 was a pivotal year for Jamf as it continued to build the only complete management and security solution for an Apple-first environment that is enterprise ...
Cyber security company Absolute Software has announced that it has earned a Federal Risk and Authorisation Management Program (FedRAMP) Ready designation suitable for a FedRAMP JAB Authorisation.
The ...
... and more. By choosing the right program for you, you'll be able to safely enjoy all the web has to offer without any risks.
Keep your computer's security software up to date
Staying up to date with your ...
GUEST OPINION: Currently, physical security operations require you to use intelligent methods to enhance safety in your organisation. Typically, these involve using the latest tools and technologies to ...
... and a security forecast for 2023.
Of note, the report found that threats from phishing and malicious emails have increased by 60%, and the average cost of a data breach is expected to reach $5 million ...
... citizen impact of the attacks.
The stark security challenges that Australian organisations face are demonstrated in a survey we commissioned of IT and SecOps decision-makers (conducted by Censuswide ...
... said Coleman. “With the increase in cyber threats, it is more important than ever for businesses to prioritise and streamline their security measures. As Ivanti is one of the only companies that combines ...
... energy goals and lower their overall carbon footprint.
Cybersecurity This past year has illustrated the real and growing threat of sophisticated and opportunistic cyber-attacks on Australian organisations. ...
... strategic plans will deliver significant benefits as the year unfolds.
The key trends to note fall into four broad categories: cloud platforms and services, IT security, networks and connectivity, and ...
... and allied health services, connected to the My Health Record system.
The agency says security requirements profile will be effective from April 2023 following a 3-month period where industry is invited ...
GUEST OPINION Ask any CEO or senior business leader what’s been keeping them up at night over the past few months and it’s almost guaranteed cybersecurity will be on that list.
After getting by unaffected ...
GUEST OPINION Ask any CEO or senior business leader what’s been keeping them up at night over the past few months and it’s almost guaranteed cybersecurity will be on that list.
After getting by unaffected ...
... channels: Analysts from Flashpoint say that “Retailers can help mitigate fraud and other cybersecurity issues this holiday season by establishing a clear and formalised communication channel with their ...
... security leaders might think they have time to prepare, the post-quantum era has already begun—and many companies are currently ill-equipped to handle such development.
In a study by (ISC)², the global ...
GUEST OPINION: As cybersecurity moves into 2023, the trends from the past few years remain firmly in place. Australian organisations are increasingly focused on optimising their use of technology, and ...
With a string of high-profile cyber attacks on Australian businesses in recent months, chances are high that it will happen again. Palo Alto Networks research found cyber security awareness still needs ...
... these complex networks inadvertently create security and performance blind spots that can leave organisations exposed to security threats and attacks.
Over 52 million cyber-attacks took place in the ...
COMPANY NEWS: After loaning money, criminals behind MoneyMonger blackmail victims with personal information stolen from their device.
Zimperium, the only mobile security platform purpose-built for ...
COMPANY NEWS: Professional services firm KPMG has partnered with security provider Vectra to bolster its AI-driven behavioural attack intelligence with KPMG’s Cyber Security services.
Vectra is part ...
... to resolve than prevent, so companies need to have a solid security program.
A security program combines a company’s security policies, tools, procedures and controls. In other words, it is the robust ...
Cyber security company Claroty has joined the World Economic Forum’s World Economic Forum's Global Innovators Community, an invitation-only group of the world’s most promising start-ups and scale-ups that ...
... infrastructures. Powered by technology acquired with Threat Stack, AIP is the newest addition to the F5 Distributed Cloud Services portfolio of cloud-native SaaS-based application security and delivery ...
... security strategy.
“With the convenience of bringing Insights’ analytics directly into ticketing and workflow systems, customers can use the tools they are already familiar with while more easily adopting ...
Data security specialist Rubrik has appointed John W. Thompson as its lead independent director.
"We've built an elite leadership team of cybersecurity experts across public and private sectors to better ...
... agencies and first responders. The deployment also includes cyber security support and vulnerability testing to help keep public data safe.
Crime Stoppers Tasmania chair David Daniels said the portal ...
... respondents (44%) said managing cybersecurity risk, while 38% said managing privacy and the collection of information, were the biggest threats to their organisations when considering investing in the ...
... systems such as Chrome Flex OS are designed to bring a modern, supportable feel to older and obsolete devices, without sacrificing security or performance. Many people and organisations will benefit from ...
... bite-sized pieces.
With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Alex was at the forefront of research and countermeasures ...
Cybersecurity and compliance company Proofpoint has entered into a definitive agreement to acquire Identity Threat Detection and Response (ITDR) provider Illusive.
Proofpoint says the acquisition ...
Seventy percent of Australian organisations surveyed said security incidents have affected business operations in the last two years, so it's not surprising that cybersecurity resilience is a top priority, ...