As the range of cloud services on offer grows, one might expect a corresponding increase in vulnerabilities – but for Microsoft, one cloud service experienced a disproportionately high number compared to others, writes James Maude, Lead Cyber Security Researcher, BeyondTrust.
New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats
Two-thirds of Australian manufacturers believe their environment is too difficult to defend. 87% admit manufacturing functions are running on outdated and unsupported legacy operating systems.
Tenable sounds the alarm on healthcare-related cyber threats
Tenable®, the Exposure Management company, has highlighted a concerning change in the tactics of cybercriminals who are now focusing their attacks on targets without significant financial standing but have the ability to cause great harm if compromised – healthcare organisations.
How to Safeguard Data From ChatGPT’s Security Risks
ChatGPT is now the fastest-growing app in history, hitting 100 million active users in just two months—way faster than the nine months it took previous record-holder TikTok to reach that mark. According to its developer OpenAI, Australia can also expect access to the subscription-based ChatGPT Plus soon.
Cyber warfare: how to counter the rising threat
While preventing ransomware attacks and data theft tend to be top priorities for corporate IT security teams, awareness is increasing of the growing threats posed by cyber warfare.
Why 2023 is the Year to Implement a Zero-Trust Strategy
Ask a group of IT security professionals to give their opinion on zero trust and you’re likely to receive a range of different responses. Some see it as little more than the latest industry fad, while others consider it a ‘must have’ strategy that can aid the battle against cyberattacks.
Are ransomware attacks becoming a cost of doing business in Australia?
It’s easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly paying millions in ransoms to bad actors who have stolen or encrypted their data.
A guide to closing the gaps through Penetration Testing
One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.