Tech Categories

Nozomi: 2023: A Crucial Year for Cybersecurity Developments in OT and ICS Industries

As cybersecurity moves into 2023, the trends from the past few years remain firmly in place. Australian organisations are increasingly focused on optimising their use of technology, and on the convergence of operational technology (OT) and information technology (IT). There has been a rapid pace of innovation in these sectors, but with these evolutions security continues to be of utmost importance. In the coming years it will be more important than ever for companies to have a clear understanding of their operational technology assets.

2023 Cybersecurity Predictions

2022 has left its mark, particularly over the last couple of months, as cybersecurity has become a national issue. The recent high-profile breaches have cast a spotlight on the devastating effects of cyber-attacks.

2022 has propelled organisations forward in its own way. In 2023 we will see yet another chapter of cybersecurity threats and challenges, along with a shift across organisations to proactively take charge of their cyber resilience against new and evolving cyber threats.

These are my top three predictions for 2023.

Are ransomware attacks becoming a cost of doing business in Australia?

It’s easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly paying millions in ransoms to bad actors who have stolen or encrypted their data.

Why an Effective Security Strategy Requires Three Pillars

The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats...

2023 Cybersecurity Predictions

2022 has left its mark, particularly over the last couple of months, as cybersecurity has become a national issue. The recent high-profile breaches have cast a spotlight on the devastating effects of cyber-attacks.

2022 has propelled organisations forward in its own way. In 2023 we will see yet another chapter of cybersecurity threats and challenges, along with a shift across organisations to proactively take charge of their cyber resilience against new and evolving cyber threats.

These are my top three predictions for 2023.

read more

Are ransomware attacks becoming a cost of doing business in Australia?

It’s easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly paying millions in ransoms to bad actors who have stolen or encrypted their data.

read more
From the Archives
A guide to closing the gaps through Penetration Testing

A guide to closing the gaps through Penetration Testing

One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. However, industrial organisations are the last bastion of on-premises computing even though there are no technical or cyber security reasons why the cloud cannot be used to transform operations. The primary limitation is cultural, and a change is needed within industrial organisations to embrace the cloud, the benefits it provides and understand why clouds are not inherently insecure.

Business cyber risks and the humble home network

Business cyber risks and the humble home network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren’t sure what that exploited means in context, imagine a hacker standing behind you 24×7 recording everything you look at and type such as usernames, passwords, credit card numbers, emails, everything! They could also send you to malicious websites, or deliver malware to your devices and steal or ransomware your data.