Tech Categories

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.

The Microsoft Azure service that had 80 vulnerabilities in one year

As the range of cloud services on offer grows, one might expect a corresponding increase in vulnerabilities – but for Microsoft, one cloud service experienced a disproportionately high number compared to others, writes James Maude, Lead Cyber Security Researcher, BeyondTrust.

Asset Deployment and the Changing Face of Mining

As an industry, mining has always been slow to adopt new ideas due to the enormous upfront investment in capital. It is clear, however, that new approaches are required to transform operations because of the pressure on margins and the need to extract raw materials more efficiently and cheaper than...

read more
From the Archives
ExtraHop Expands CrowdStrike Partnership with CrowdStrike Falcon® LogScale Integration

ExtraHop Expands CrowdStrike Partnership with CrowdStrike Falcon® LogScale Integration

SEATTLE – March 27, 2023 – ExtraHop, the leader in cloud-native network detection and response (NDR), today announced a new integration enabling customers to ingest network data from Reveal(x) 360 in CrowdStrike Falcon® LogScale. The new integration will provide joint customers with comprehensive visibility for optimised threat hunting and critical resource allocation for incident response.

Finding clarity in the noise: visibility and AI in an age plagued by security threats

Finding clarity in the noise: visibility and AI in an age plagued by security threats

Today’s world demands businesses to improve cybersecurity measures and gain greater visibility over threats and attack surfaces, else fall prey to sophisticated and targeted attacks. The more visibility an organization has, the better equipped to detect and respond in a timely, meaningful way. Luckily, with security of increasing importance, there are more tools and solutions available, with the likes of artificial intelligence (AI) arming us with greater ability to understand our attack surface and catch threats fast.

Why Security Vulnerability Management Strategies Need to Evolve

Why Security Vulnerability Management Strategies Need to Evolve

The capabilities offered by business software applications are constantly growing, but unfortunately so too are the number of vulnerabilities. Much of this challenge can be attributed to the rate of change that is occurring within organisations. Determined to improve productivity and reduce operational costs, many are embracing strategies of digital transformation and deploying new applications at an increasing rate.

How to Safeguard Data From ChatGPT’s Security Risks

How to Safeguard Data From ChatGPT’s Security Risks

ChatGPT is now the fastest-growing app in history, hitting 100 million active users in just two months—way faster than the nine months it took previous record-holder TikTok to reach that mark. According to its developer OpenAI, Australia can also expect access to the subscription-based ChatGPT Plus soon.