by Ashley Diffey | Nov 18, 2024 | Identity & Access Management, Risk Management
Many businesses today rely on hybrid IT environments that integrate a complex array of applications, datacentres, and cloud services. While these diverse ecosystems offer flexibility, they also present a critical challenge: identity silos. Fragmented identity and...
by Shane Maher | Nov 12, 2024 | ANZ, Government & Policy
Introduction Australian policymakers are converging on a few challenging issues simultaneously. With a growing population and the tail end of an inflation outbreak, the housing crisis seems set to persist, affecting affordability for years to come. In this context,...
by The Production Team | Nov 4, 2024 | Artificial Intelligence, Cloud Security, Data Management, Sustainability
NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise...
by Matias Madou | Nov 4, 2024 | Banking & Finance
For as long as banks and financial institutions have existed, so too have those seeking to steal from them. The infamous bank robber Willie Sutton, active in the 1920s, famously quipped that he targeted banks “because that’s where the money is.” While the methods have...
by Chuck Suitor | Nov 1, 2024 | Continuous Business, Microsegmentation, Zero Trust
Introduction Cyberattacks in the healthcare industry are surging at an unprecedented rate, with fresh breaches making headlines nearly every day. Data from the U.S. Department of Health and Human Services (HHS) shows that major healthcare data breaches have seen a...
by Morey Haber | Nov 1, 2024 | Cyber Resilience
Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications. Australian enterprises of all types have grown accustomed to running their application estates on virtualised server infrastructure. The...
by George Moawad | Nov 1, 2024 | Cyber Resilience
As cybercrime reaches unprecedented levels, the urgency for businesses to bolster their defences is strong. A report from Cybersecurity Ventures[1] predicts that global cybercrime costs will soar to $10.5 trillion annually by 2025, marking a 15% growth per year. This...
by Kerrick Lehman | Oct 31, 2024 | Cloud Security, Critical Infrastructure, Network Security, Reports & Predictions
Introduction According to IDC’s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of today’s digital economy. Some might say that’s an alarming...
by The Production Team | Oct 31, 2024 | Exposure Management, Reports & Predictions, Threat Intelligence
In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute...
by Olly Stimpson | Oct 29, 2024 | Personal Security, Security Awareness
As Cybersecurity Awareness Month draws to a close, the message “Cybersecurity is Everyone’s Business” remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian...
by ColorTokens | Oct 24, 2024 | Microsegmentation
As a parent of middle and high schoolers—and with some of their friends still in elementary school—I often find myself answering this familiar question: “When will I ever use math in real life?” It’s a fair question, one I’ve heard many times. So, inspired by my...
by Krishna Kumar | Oct 21, 2024 | Artificial Intelligence, Government & Policy
For Context As Australia’s three levels of government undergo a digital transformation, meeting the increasing demand for efficient, citizen-centric services is critical. Technology plays a central role in this transformation, enabling governments to better connect...
by Anthony Spiteri | Oct 21, 2024 | Cyber Resilience, Data Management, Security Operations
Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia’s regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45...
by John Mackenney | Oct 21, 2024 | Cyber Resilience, Leadership, OT Security, Security Operations
Introduction In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised...
by Itzik Swissa | Oct 21, 2024 | Application Security, Supply Chain
Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security...
by Chuck Suitor | Oct 21, 2024 | Microsegmentation, Security Operations, Social Engineering
You walk into a hospital where the power is out, patient records are inaccessible, and life-saving equipment has ground to a halt. It’s a stark reality we could face if we don’t act now. Cyberattacks aren’t just about stolen data anymore....
by The Production Team | Oct 16, 2024 | Cloud Security, Data Management
Watch The Interview Biography Pravjit (Prav) Tiwana is a technology executive with more than two decades of experience building highly scaled, cloud-powered products, services, and businesses. He is senior vice president and general manager responsible for...
by The Production Team | Oct 15, 2024 | Data Management, Executive Communication, Leadership, Security Operations
Watch The Interview Biography Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions...
by Mandy Andress | Oct 15, 2024 | Artificial Intelligence, Cyber Resilience
Introduction The arrival of generative AI and its seemingly endless possibilities also came with a myriad of sophisticated threats. And as organisations move to increasingly complex digital environments and struggle to analyse the exponential growth of security data,...
by Ashvin Kamaraju | Oct 15, 2024 | Personal Security, Security Awareness, SMB
Cybersecurity Awareness Month is an international initiative that focuses on simple ways to protect ourselves, our families, and our businesses from online threats. The 2025 theme “Secure Our World” highlights the pervasiveness of digital technologies that enable...
by The Production Team | Oct 14, 2024 | Cyber Resilience, Data Management, Governance & Risk, Leadership
Watch The Interview Biography Sandeep Singh is Senior Vice President and General Manager, Enterprise Storage at NetApp. Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building...
by ColorTokens | Oct 14, 2024 | Identity & Access Management, Security Awareness, Security Operations, Social Engineering
I’m sure you’ve noticed that whenever a cybersecurity breach makes headlines, the finger often points straight at humans. High-profile incidents like the SolarWinds attack, where human error was cited as a key factor, the recent 23andMe breach blamed on...
by Shachar Menashe | Oct 14, 2024 | Security Operations, Threat Intelligence
On September 23rd, Twitter user Simone Margaritelli (@evilsocket) announced that he has discovered and privately disclosed a CVSS 9.9 GNU/Linux unauthenticated RCE, which affects almost all Linux distributions, and that the public disclosure will happen on September...
by The Production Team | Oct 11, 2024 | Cloud Security, Cyber Resilience, Data Management, Innovation
Watch The Interview Biography Haiyan Song is EVP & GM, CloudOps @ NetApp. Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with...
by ColorTokens | Oct 11, 2024 | Critical Infrastructure, Microsegmentation
The Landscape American Water, the largest water and wastewater utility in the United States, plays a crucial role in ensuring the availability of safe and reliable drinking water for millions of residents. Recently, the company encountered a significant challenge when...
by The Production Team | Oct 11, 2024 | Cyber Resilience, Data Management, Innovation, Leadership
Watch The Interview Biography Ashish Dhawan is NetApp’s Senior Vice President of Global Cloud Sales. At the helm of NetApp’s Cloud Business Unit as the Senior Vice President, General Manager, and Chief Revenue Officer, his focus is on driving growth through...
by Malin Svensson | Oct 10, 2024 | Security Operations
The security industry has long been perceived as a male-dominated field. According to the Royal Melbourne Institute of Technology’s (RMIT) analysis of 2021 Census data, women make up only 16% of Australia’s cybersecurity workforce—a statistic mirrored globally. This...
by The Production Team | Oct 9, 2024 | Cyber Resilience, Data Management, Leadership
Watch The Interview Biography Gagan’s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance...
by The Production Team | Oct 8, 2024 | Data Management, Product Development
Watch The Interview Biography Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product & solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp,...
by Mark Bowling | Oct 8, 2024 | Network Security
When a cyber incident strikes, the big question on every executive’s mind is, “How bad is it?” Unfortunately, the immediate answer is often, “We don’t know.” Understanding the full scope and impact of a breach can take weeks, if not...
by Zak Menegazzi | Oct 2, 2024 | Threat Intelligence
The Australian Signals Directorate (ASD) is encouraging every individual and organisation this Cyber Security Awareness Month to take action to secure their accounts and devices from cyber threats. They have outlined four simple steps for all Australians to improve...
by Scott McKinnel | Oct 2, 2024 | Security Awareness
The sheer number of cyber threats organisations face today is staggering, as demonstrated by the MediSecure hack earlier this year, which compromised the data of about 12.9 million Australians, marking it as one of the largest cyber breaches in the country’s...
by Matias Madou | Sep 30, 2024 | Application Security, Leadership, Risk Management
Having to constantly measure return on investment (ROI) is the bane of many executives’ lives. For CISOs, the key challenge is proving the business value and effectiveness of cybersecurity efforts. For years, many CISOs have struggled to educate their developers about...
by ColorTokens | Sep 30, 2024 | Microsegmentation, Security Operations, Threat Intelligence
“The Cybersecurity and Infrastructure Security Agency (CISA) defines insider threat as the threat that an insider will use their authorized access, intentionally or unintentionally, to do harm to the department’s mission, resources, personnel, facilities, information,...
by Zoe Hamlyn | Sep 26, 2024 | Encryption & Cipher, Product Development
Cloudflare and WhatsApp partner to pioneer a third-party security audit on Key Transparency technology Sydney, Australia, September 24, 2024 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced a new service to verify the integrity...
by Reuben Koh | Sep 24, 2024 | Application Security
By Reuben Koh, Director of Security Technology & Strategy, APJ at Akamai Technologies As more economies around the world become digitalised, the adoption rate in Application Programming Interface (API) has also skyrocketed. According to Market Data Forecast, the...
by Anna Perez | Sep 23, 2024 | Continuous Business, Cyber Resilience
Anna Perez, business development manager, Wavelink and Connected Health Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply...
by Christoph Nagy | Sep 23, 2024 | Application Security
By Christoph Nagy, SecurityBridge Once you know how to efficiently secure the SAP environment, the next step should be to learn how to maintain that security and continuously improve your SAP Security posture. SAP landscapes are quite dynamic and, as they need to be...
by Lee Shelford | Sep 23, 2024 | Artificial Intelligence
The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The...
by Luke Power | Sep 18, 2024 | IoT & Robotics, Zero Trust
As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent. The proliferation of smart sensors, edge devices, and robotics has significantly expanded the attack surface, making...
by Sadiq Iqbal | Sep 17, 2024 | Cyber Resilience
Here in Australia, we aim to have a healthcare system that takes excellent care of each and every one of us. We’ve highly qualified GPs who treat common medical conditions and hospitals where Australians of all backgrounds and ages expect to receive the best possible...
by Gareth Cox | Sep 9, 2024 | Artificial Intelligence
As artificial intelligence (AI) continues to permeate an increasing portion of daily business life, the need for robust cybersecurity measures has become vital. AI systems, with their complex algorithms and vast datasets, present unique challenges for traditional...
by Kumar Mitra | Sep 3, 2024 | Artificial Intelligence
The need for intention Jim Carrey said, “Not one single thing has ever been accomplished without intention”. When we intentionally set out to do something we plan to fulfil a motive, purpose, or objective as a result. There is a meaning behind the action; a sense of...
by Oshana Jouna | Sep 2, 2024 | CAASM, IoT & Robotics
Introduction The evolution of the humble security camera into a cloud-connected multifunction safety device we see used today has come with a plethora of new capabilities and opportunities for security practitioners. Yet with internet-connected devices come risks....
by Ashish Khanna | Sep 2, 2024 | Risk Management
By Ashish Khanna High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of...
by Tenable | Sep 2, 2024 | Exposure Management, Reports & Predictions, Threat Intelligence
Introduction Tenable®, the exposure management company, has released a research report titled “The Critical Few: How to Expose and Close the Threats that Matter” that identifies the key exposure points within organisations and outlines actionable steps to mitigate...
by Tristan Fong | Aug 30, 2024 | Crypto, Blockchain, and NFTs
Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know...
by Ashley Diffey | Aug 29, 2024 | Identity & Access Management
Banking fraud continues to be a significant and costly challenge for financial institutions in Australia and around the world. As cybercriminals become increasingly sophisticated, they are leveraging advanced technologies, including artificial intelligence (AI), to...