|
|
|
GUEST RESEARCH: Analysis finds 70% of cloud workloads using AI services contain unresolved vulnerabilities
COMPANY NEWS: Bitdefender's security researchers have identified a large-scale ad fraud campaign that deployed hundreds of malicious apps in the Google Play Store, resulting in more than 60 million downloads total. The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks.
March 31st is World Backup Day – the annual reminder of the importance of backing up and protecting data from loss and theft. The universal messages of making regular backups, keeping offline copies and more are as important as ever – but in an increasingly digital, cloud enabled world and with a rapidly evolving threat landscape, there are other aspects of effective backup that are worth thinking about on World Backup Day. They may not be as obvious, but they are just as important.
GUEST OPINION: The emergence of Chinese AI start-ups such as DeepSeek and a review of Australia’s own sovereign AI and cybersecurity capabilities are gaining more political attention in the lead up to this year’s federal election.
GUEST RESEARCH: When new technologies such as generative artificial intelligence (GenAI) emerge, cybercriminals inevitably look for ways to exploit its capabilities for malicious purposes. While most mainstream GenAI models have built-in safeguards to prevent misuse, Tenable Research has found that DeepSeek R1 can be tricked into generating malware, raising concerns about the security risks posed by AI-powered cybercrime.
F5 BIG-IP Next Cloud-Native Network Functions deployed on NVIDIA BlueField-3 DPUs turbocharge data management and security, unlocking new edge AI innovations and driving the future of AI-RAN
GUEST OPINION: Attacks on software supply chains are becoming an increasing concern for security teams around the world. These attacks can cause significant disruption or financial losses for those targeted.
COMPANY NEWS: Exabeam Secures Top Honors in SIEM, AI Security Solution, and Most Innovative Cybersecurity Company
CyberArk (NASDAQ: CYBR) and Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, automated access management and device lifecycle protection.
COMPANY NEWS: Unlocking Web3: How Real-Time Security Can Drive Blockchain Adoption
Company's SIEM Solution, Log360, Evolves Into a Unified Security Platform; Helps Simplify Security Operations and Future-Proofs Security Investments
The Mongolian Tax Administration (MTA), responsible for tax administration, revenue collection, and compliance enforcement for a population of approximately 3.5 million people, has significantly improved its data management and operational efficiency through the adoption of Cloudera for data, analytics, and AI.
Survey reveals urgent need for prioritisation of network and security architecture transformation and adoption of a Zero Trust ‘Resilient by Design’ approach for cyber resilience strategies in the face of inevitable future attacks
Australian companies need to establish clear ransomware policies and improve their understanding of their attack surface to enhance their cyber security, says a visiting global expert.
AI continues to be a force multiplier for good, aiding cybersecurity protections, while also enabling bad actors to harness the technology in their attack vectors.
Motorola Solutions’ PSCore mobile app expanded to help identify vehicles of interest
Western Australia Police Force is conducting faster and better-informed investigations and road policing throughout the state through the addition of automatic number plate recognition (ANPR) capability within Motorola Solutions’ PSCore mobile application.
GUEST RESEARCH: Building managers are reporting the use of AI to help them enhance operational efficiencies with streamlined maintenance, upgraded security and optimised energy usage
Check Point Software Technologies Ltd (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that Adelaide-based Southern Cyber, a leading provider of cyber security solutions, has reinforced its commitment to delivering world-class cyber security by implementing a prevention-first strategy.
Cybersecurity company Bitdefender has joined the Amazon Web Services (AWS) Independent Software Vendor (ISV) Accelerate Program.
ThreatX Protect Addresses Critical Need to Protect Against Evolving Application and API Security Threats
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]