by Zak Menegazzi | Oct 2, 2024 | Threat Intelligence
The Australian Signals Directorate (ASD) is encouraging every individual and organisation this Cyber Security Awareness Month to take action to secure their accounts and devices from cyber threats. They have outlined four simple steps for all Australians to improve...
by Scott McKinnel | Oct 2, 2024 | Security Awareness
The sheer number of cyber threats organisations face today is staggering, as demonstrated by the MediSecure hack earlier this year, which compromised the data of about 12.9 million Australians, marking it as one of the largest cyber breaches in the country’s...
by Matias Madou | Sep 30, 2024 | Application Security, Leadership, Risk Management
Having to constantly measure return on investment (ROI) is the bane of many executives’ lives. For CISOs, the key challenge is proving the business value and effectiveness of cybersecurity efforts. For years, many CISOs have struggled to educate their developers about...
by ColorTokens | Sep 30, 2024 | Microsegmentation, Security Operations, Threat Intelligence
“The Cybersecurity and Infrastructure Security Agency (CISA) defines insider threat as the threat that an insider will use their authorized access, intentionally or unintentionally, to do harm to the department’s mission, resources, personnel, facilities, information,...
by mollypringlee | Sep 26, 2024 | Encryption & Cipher, Product Development
Cloudflare and WhatsApp partner to pioneer a third-party security audit on Key Transparency technology Sydney, Australia, September 24, 2024 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced a new service to verify the integrity...
by Reuben Koh | Sep 24, 2024 | Application Security
By Reuben Koh, Director of Security Technology & Strategy, APJ at Akamai Technologies As more economies around the world become digitalised, the adoption rate in Application Programming Interface (API) has also skyrocketed. According to Market Data Forecast, the...
by Anna Perez | Sep 23, 2024 | Cyber Resilience
Anna Perez, business development manager, Wavelink and Connected Health Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply...
by Christoph Nagy | Sep 23, 2024 | Application Security
By Christoph Nagy, SecurityBridge Once you know how to efficiently secure the SAP environment, the next step should be to learn how to maintain that security and continuously improve your SAP Security posture. SAP landscapes are quite dynamic and, as they need to be...
by Lee Shelford | Sep 23, 2024 | Artificial Intelligence
The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The...
by Luke Power | Sep 18, 2024 | IoT & Robotics, Zero Trust
As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent. The proliferation of smart sensors, edge devices, and robotics has significantly expanded the attack surface, making...
by Sadiq Iqbal | Sep 17, 2024 | Cyber Resilience
Here in Australia, we aim to have a healthcare system that takes excellent care of each and every one of us. We’ve highly qualified GPs who treat common medical conditions and hospitals where Australians of all backgrounds and ages expect to receive the best possible...
by Gareth Cox | Sep 9, 2024 | Artificial Intelligence
As artificial intelligence (AI) continues to permeate an increasing portion of daily business life, the need for robust cybersecurity measures has become vital. AI systems, with their complex algorithms and vast datasets, present unique challenges for traditional...
by Kumar Mitra | Sep 3, 2024 | Artificial Intelligence
The need for intention Jim Carrey said, “Not one single thing has ever been accomplished without intention”. When we intentionally set out to do something we plan to fulfil a motive, purpose, or objective as a result. There is a meaning behind the action; a sense of...
by Oshana Jouna | Sep 2, 2024 | CAASM, IoT & Robotics
Introduction The evolution of the humble security camera into a cloud-connected multifunction safety device we see used today has come with a plethora of new capabilities and opportunities for security practitioners. Yet with internet-connected devices come risks....
by Ashish Khanna | Sep 2, 2024 | Risk Management
By Ashish Khanna High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of...
by Tenable | Sep 2, 2024 | Exposure Management, Reports & Predictions, Threat Intelligence
Introduction Tenable®, the exposure management company, has released a research report titled “The Critical Few: How to Expose and Close the Threats that Matter” that identifies the key exposure points within organisations and outlines actionable steps to mitigate...
by Tristan Fong | Aug 30, 2024 | Crypto, Blockchain, and NFTs
Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know...
by Ashley Diffey | Aug 29, 2024 | Identity & Access Management
Banking fraud continues to be a significant and costly challenge for financial institutions in Australia and around the world. As cybercriminals become increasingly sophisticated, they are leveraging advanced technologies, including artificial intelligence (AI), to...
by Pieter Danhieux | Aug 29, 2024 | Cyber Resilience
The challenges faced by IT security teams are increasing by the day. Wider attack surfaces and the emergence of more sophisticated techniques have resulted in approaches that may have worked in the past no longer being sufficient to ensure effective protection....
by Shane Maher | Aug 29, 2024 | Compliance & Legal
The Federal Government’s apparent appetite to compel companies to report when they pay a cybersecurity ransom for the sake of information collection could be Australia’s best chance of materially stamping out bad cyber practices. The question is when and how they do...
by Venky Raju | Aug 23, 2024 | Artificial Intelligence, Microsegmentation, Security Awareness, Threat Intelligence
I’m sure by now you’ve heard enough about the adoption of AI by your favorite cybersecurity vendors. You may have also attended presentations or conference sessions about using AI to improve the speed and accuracy of detecting threats. But what about the offensive...
by Christiaan Beek | Aug 23, 2024 | Security Awareness, Threat Intelligence
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access...
by Rick Vanover | Aug 23, 2024 | Artificial Intelligence, Cyber Resilience, Data Management
Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive...
by James Calder | Aug 23, 2024 | Cyber Resilience, Security Operations
Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the...
by Devasmita Das | Aug 23, 2024 | Microsegmentation
The Internet of Medical Things (IoMT) is transforming healthcare with its rapidly expanding ecosystem of interconnected devices. As this technology advances, its impact extends beyond traditional clinics and hospitals, projecting the IoT in healthcare market to reach...
by Scott Morris | Aug 22, 2024 | Security Awareness, Social Engineering, Threat Intelligence
Introduction Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not...
by Kerrick Lehman | Aug 19, 2024 | Vendor Management
Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question – how can technology leaders realign...
by John Griffin | Aug 16, 2024 | Leadership, Security Operations
Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include...
by Jason Whyte | Aug 16, 2024 | Cyber Resilience, Security Awareness
A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses...
by Andrew Shea | Aug 14, 2024 | Learning & Education, Security Awareness
Introduction Australia is facing a significant shortfall in the number of cybersecurity professionals needed to defend people, governments and businesses. With AustCyber forecasting a shortfall of almost 17,000 cybersecurity workers by 2026, current efforts by the...
by Technology Brokers Australia | Aug 12, 2024 | Security Operations
Introduction In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many...
by Mohamed Marjook Hussain | Aug 9, 2024 | Security Operations
Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Government’s...
by Colin Garro | Aug 7, 2024 | Risk Management
In today’s fast-paced digital landscape, the adage “time is money” has never been more relevant, especially when it comes to cybersecurity. If you’re taking days or even weeks to report on your current cyber asset risk posture, you’re leaving...
by Tales Sian Lopes | Aug 6, 2024 | Personal Security, Security Awareness
Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission’s report Australians lost AUD $2.74 billion to scams in 2023 –...
by Christoph Nagy | Jul 29, 2024 | Application Security
When looking at a large and complex SAP landscape, some might think that implementing an effective security posture for such an environment is a big and long-term project. We see a lot of tools in the market that provide security for SAP as a service and show results...
by Scott McKinnel | Jul 25, 2024 | Exposure Management, Risk Management
Introduction Australian manufacturers are standing at a critical crossroads as the landscape of both manufacturing and cyber insurance undergo significant shifts. Insurance, while often viewed as a safety net, provides extremely limited coverage when it comes to...
by Brian Moussalli | Jul 23, 2024 | Supply Chain, Threat Intelligence
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a...
by Fortinet | Jul 23, 2024 | Reports & Predictions, Threat Intelligence
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics,...
by William Glasson | Jul 22, 2024 | Compliance & Legal, Data Management
In a time of digital transformation and big data, privacy has never been a bigger concern. An Introduction There seems to be no limit to the number of devices connected to our networks. As internet connectivity becomes more widespread and affordable, more of us can...
by Jeff Lee | Jul 12, 2024 | Cloud Security, Cyber Resilience, Security Operations
The strategic use of cloud technology has become a cornerstone for businesses who wish to stay competitive and adaptable in today’s evolving landscape. However, amidst the rapid enthusiasm to adopt and optimise cloud resources, crucial considerations such as security...
by Stuart Mort | Jul 11, 2024 | Executive Communication, Governance & Risk, Leadership
Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the...
by Sumit Bansal | Jul 11, 2024 | Risk Management, Threat Intelligence
The most effective third-party risk management (TPRM) programmes prioritise risk remediation alongside risk identification. While security ratings services (SRS) have long focused on risk identification, the burden of curation and remediation has traditionally fallen...
by Mina Mousa | Jul 11, 2024 | Cloud Security
Cyber threats are a serious challenge that governments worldwide are dealing with every day. A cyberattack can cause breach of data or information, cost time and money to resolve or cause downtime impacting operations. For the past 10 years, an annual CIO survey in...
by Shane Maher | Jul 3, 2024 | Security Operations, SMB
Introduction The ever-present threat of cyberattacks and a rapidly changing technological landscape have forced organisations of all sizes, particularly small businesses, to prioritise cybersecurity. An increased focus on centralised security operations for companies...
by Mark Jones | Jul 3, 2024 | Leadership, Work & Careers
With AustCyber touting a shortfall of 16,000 cybersecurity professionals by 2026, the race to build the nation’s cybersecurity talent and capacity is on. Organisations of all sizes and across every industry vertical are trying to find skilled people to help protect...
by Sadiq Iqbal | Jul 3, 2024 | Critical Infrastructure, Endpoint Protection
Australian telcos and policymakers alike are increasingly displaying a keen interest in the number of outdated mobile handsets in use in the population. The reason for this is that a sizeable number of mobile users are about to be left behind by the steady march of...
by Pieter Danhieux | Jun 24, 2024 | Application Security, Risk Management, Security Operations
When it comes to enterprise cybersecurity, nothing is set in stone. With a constantly shifting threat landscape on one hand and evolving tools on the other, security teams can often feel overworked and overwhelmed. When you add the additional layer of regulatory...
by Kavitha Mariappan | Jun 7, 2024 | Government & Policy, Leadership, Reports & Predictions
What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure....