Tech Categories

How to Safeguard Data From ChatGPT’s Security Risks

ChatGPT is now the fastest-growing app in history, hitting 100 million active users in just two months—way faster than the nine months it took previous record-holder TikTok to reach that mark. According to its developer OpenAI, Australia can also expect access to the subscription-based ChatGPT Plus soon.

ASIC Cracks Down on Companies Failing to Uphold Data Protection Standards With Hefty Penalties

In recent months, the Australian corporate regulator ASIC has warned that it will be seeking record penalties for breaches of market disclosure, and in particular, those related to cyber attacks.

Cyber warfare: how to counter the rising threat

While preventing ransomware attacks and data theft tend to be top priorities for corporate IT security teams, awareness is increasing of the growing threats posed by cyber warfare.

Security Emerges As A Critical Input To User Experience Decisions

Security is shifting even further ‘left’, away from developers and into the design thinking of CX and UX
teams, writes Ping Identity’s Head of APAC & Japan Ashley Diffey.

From the Archives
A guide to closing the gaps through Penetration Testing

A guide to closing the gaps through Penetration Testing

One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. However, industrial organisations are the last bastion of on-premises computing even though there are no technical or cyber security reasons why the cloud cannot be used to transform operations. The primary limitation is cultural, and a change is needed within industrial organisations to embrace the cloud, the benefits it provides and understand why clouds are not inherently insecure.

Business cyber risks and the humble home network

Business cyber risks and the humble home network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren’t sure what that exploited means in context, imagine a hacker standing behind you 24×7 recording everything you look at and type such as usernames, passwords, credit card numbers, emails, everything! They could also send you to malicious websites, or deliver malware to your devices and steal or ransomware your data.