Risk Management

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.

The Microsoft Azure service that had 80 vulnerabilities in one year

As the range of cloud services on offer grows, one might expect a corresponding increase in vulnerabilities – but for Microsoft, one cloud service experienced a disproportionately high number compared to others, writes James Maude, Lead Cyber Security Researcher, BeyondTrust.

New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats

Two-thirds of Australian manufacturers believe their environment is too difficult to defend. 87% admit manufacturing functions are running on outdated and unsupported legacy operating systems.

Tenable sounds the alarm on healthcare-related cyber threats

Tenable®, the Exposure Management company, has highlighted a concerning change in the tactics of cybercriminals who are now focusing their attacks on targets without significant financial standing but have the ability to cause great harm if compromised – healthcare organisations.

From the Archives
How to Safeguard Data From ChatGPT’s Security Risks

How to Safeguard Data From ChatGPT’s Security Risks

ChatGPT is now the fastest-growing app in history, hitting 100 million active users in just two months—way faster than the nine months it took previous record-holder TikTok to reach that mark. According to its developer OpenAI, Australia can also expect access to the subscription-based ChatGPT Plus soon.

Why 2023 is the Year to Implement a Zero-Trust Strategy

Why 2023 is the Year to Implement a Zero-Trust Strategy

Ask a group of IT security professionals to give their opinion on zero trust and you’re likely to receive a range of different responses. Some see it as little more than the latest industry fad, while others consider it a ‘must have’ strategy that can aid the battle against cyberattacks.

Are ransomware attacks becoming a cost of doing business in Australia?

Are ransomware attacks becoming a cost of doing business in Australia?

It’s easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly paying millions in ransoms to bad actors who have stolen or encrypted their data.

A guide to closing the gaps through Penetration Testing

A guide to closing the gaps through Penetration Testing

One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.