Dumping Ground
Start:
Start:
End:

Register

Editors Pick

Acting With Intent With AI

The need for intention Jim Carrey said, “Not one single thing has ever been accomplished without intention”. When we intentionally set out to do something we plan to fulfil a motive, purpose, or objective as a result. There is a meaning behind the action; a sense of...

Opening Up Cloud Architecture For Safer Security Infrastructure

The evolution of the humble security camera into a cloud-connected multifunction safety device we see used today has come with a plethora of new capabilities and opportunities for security practitioners. Yet with internet-connected devices come risks. Let’s explore why open-source architectures are, in fact, more secure while offering greater scalability and flexibility.

Sports Venues Must Vet Their Vendors To Maintain Security

High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of connectivity that include vendors, sponsors, employees, and consumers. These networks connect ticketing, merchandising, venue access, live events information, and everything in between. This connectivity delivers a lot of value to venues, vendors and consumers alike, but it also can create potential points of entry for threat actors. With France reporting over 140 cyberattacks linked to Olympics alone – while none of these disrupted the competitions themselves – it gives us reason to consider critical targets associated with high profile events that target government entities as well as sports, retail, transport and telecoms infrastructure. This article takes a look at some critical considerations for businesses and fans as retail activity heats up around sporting events this summer.

New Tenable Research Reveals Only 3% of Vulnerabilities Pose Significant Cybersecurity Risk

Company analysed 50 Trillion data points over two decades to identify critical vulnerabilities

Security is Not a Zero-Sum Game

Security is Not a Zero-Sum Game

The future of cybersecurity is a big and broad topic - specifically our reliance on cloud-based software. Things go wrong ...
No results found.
No results found.
New Tenable Research Reveals Only 3% of Vulnerabilities  Pose Significant Cybersecurity Risk

New Tenable Research Reveals Only 3% of Vulnerabilities Pose Significant Cybersecurity Risk

Company analysed 50 Trillion data points over two decades to identify critical vulnerabilities Read More

From Dollars to Digital – Your Guide to Investing Safely

From Dollars to Digital – Your Guide to Investing Safely

Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost ... Read More

Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Organisations are currently unprepared to enact a high, consistent standard of software creation that follows secure-by-design principles. This needs to improve exponentially, and precision measurement of organisational security maturity—and individual developer security skills—will be paramount in facilitating the right growth and knowledge building. Read More

Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem. Read More

Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help. Read More

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we delve into a major forum frequented by ransomware actors and affiliates, called RAMP. Read More

Share This