by Mandy Andress | Oct 15, 2024 | Artificial Intelligence, Cyber Resilience
Introduction The arrival of generative AI and its seemingly endless possibilities also came with a myriad of sophisticated threats. And as organisations move to increasingly complex digital environments and struggle to analyse the exponential growth of security data,...
by Ashvin Kamaraju | Oct 15, 2024 | Personal Security, Security Awareness, SMB
Cybersecurity Awareness Month is an international initiative that focuses on simple ways to protect ourselves, our families, and our businesses from online threats. The 2025 theme “Secure Our World” highlights the pervasiveness of digital technologies that enable...
by The Production Team | Oct 14, 2024 | Cyber Resilience, Data Management, Governance & Risk, Leadership
Watch The Interview Biography Sandeep Singh is Senior Vice President and General Manager, Enterprise Storage at NetApp. Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building...
by ColorTokens | Oct 14, 2024 | Identity & Access Management, Security Awareness, Security Operations, Social Engineering
I’m sure you’ve noticed that whenever a cybersecurity breach makes headlines, the finger often points straight at humans. High-profile incidents like the SolarWinds attack, where human error was cited as a key factor, the recent 23andMe breach blamed on...
by Shachar Menashe | Oct 14, 2024 | Security Operations, Threat Intelligence
On September 23rd, Twitter user Simone Margaritelli (@evilsocket) announced that he has discovered and privately disclosed a CVSS 9.9 GNU/Linux unauthenticated RCE, which affects almost all Linux distributions, and that the public disclosure will happen on September...
by The Production Team | Oct 11, 2024 | Cloud Security, Cyber Resilience, Data Management, Innovation
Watch The Interview Biography Haiyan Song is EVP & GM, CloudOps @ NetApp. Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with...
by ColorTokens | Oct 11, 2024 | Critical Infrastructure, Microsegmentation
The Landscape American Water, the largest water and wastewater utility in the United States, plays a crucial role in ensuring the availability of safe and reliable drinking water for millions of residents. Recently, the company encountered a significant challenge when...
by The Production Team | Oct 11, 2024 | Cyber Resilience, Data Management, Innovation, Leadership
Watch The Interview Biography Ashish Dhawan is NetApp’s Senior Vice President of Global Cloud Sales. At the helm of NetApp’s Cloud Business Unit as the Senior Vice President, General Manager, and Chief Revenue Officer, his focus is on driving growth through...
by Malin Svensson | Oct 10, 2024 | Security Operations
The security industry has long been perceived as a male-dominated field. According to the Royal Melbourne Institute of Technology’s (RMIT) analysis of 2021 Census data, women make up only 16% of Australia’s cybersecurity workforce—a statistic mirrored globally. This...
by The Production Team | Oct 9, 2024 | Cyber Resilience, Data Management, Leadership
Watch The Interview Biography Gagan’s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance...
by The Production Team | Oct 8, 2024 | Data Management, Product Development
Watch The Interview Biography Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product & solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp,...
by Mark Bowling | Oct 8, 2024 | Network Security
When a cyber incident strikes, the big question on every executive’s mind is, “How bad is it?” Unfortunately, the immediate answer is often, “We don’t know.” Understanding the full scope and impact of a breach can take weeks, if not...
by Zak Menegazzi | Oct 2, 2024 | Threat Intelligence
The Australian Signals Directorate (ASD) is encouraging every individual and organisation this Cyber Security Awareness Month to take action to secure their accounts and devices from cyber threats. They have outlined four simple steps for all Australians to improve...
by Scott McKinnel | Oct 2, 2024 | Security Awareness
The sheer number of cyber threats organisations face today is staggering, as demonstrated by the MediSecure hack earlier this year, which compromised the data of about 12.9 million Australians, marking it as one of the largest cyber breaches in the country’s...
by Matias Madou | Sep 30, 2024 | Application Security, Leadership, Risk Management
Having to constantly measure return on investment (ROI) is the bane of many executives’ lives. For CISOs, the key challenge is proving the business value and effectiveness of cybersecurity efforts. For years, many CISOs have struggled to educate their developers about...
by ColorTokens | Sep 30, 2024 | Microsegmentation, Security Operations, Threat Intelligence
“The Cybersecurity and Infrastructure Security Agency (CISA) defines insider threat as the threat that an insider will use their authorized access, intentionally or unintentionally, to do harm to the department’s mission, resources, personnel, facilities, information,...
by Zoe Hamlyn | Sep 26, 2024 | Encryption & Cipher, Product Development
Cloudflare and WhatsApp partner to pioneer a third-party security audit on Key Transparency technology Sydney, Australia, September 24, 2024 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced a new service to verify the integrity...
by Reuben Koh | Sep 24, 2024 | Application Security
By Reuben Koh, Director of Security Technology & Strategy, APJ at Akamai Technologies As more economies around the world become digitalised, the adoption rate in Application Programming Interface (API) has also skyrocketed. According to Market Data Forecast, the...
by Anna Perez | Sep 23, 2024 | Continuous Business, Cyber Resilience
Anna Perez, business development manager, Wavelink and Connected Health Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply...
by Christoph Nagy | Sep 23, 2024 | Application Security
By Christoph Nagy, SecurityBridge Once you know how to efficiently secure the SAP environment, the next step should be to learn how to maintain that security and continuously improve your SAP Security posture. SAP landscapes are quite dynamic and, as they need to be...
by Lee Shelford | Sep 23, 2024 | Artificial Intelligence
The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The...
by Luke Power | Sep 18, 2024 | IoT & Robotics, Zero Trust
As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent. The proliferation of smart sensors, edge devices, and robotics has significantly expanded the attack surface, making...
by Sadiq Iqbal | Sep 17, 2024 | Cyber Resilience
Here in Australia, we aim to have a healthcare system that takes excellent care of each and every one of us. We’ve highly qualified GPs who treat common medical conditions and hospitals where Australians of all backgrounds and ages expect to receive the best possible...
by Gareth Cox | Sep 9, 2024 | Artificial Intelligence
As artificial intelligence (AI) continues to permeate an increasing portion of daily business life, the need for robust cybersecurity measures has become vital. AI systems, with their complex algorithms and vast datasets, present unique challenges for traditional...
by Kumar Mitra | Sep 3, 2024 | Artificial Intelligence
The need for intention Jim Carrey said, “Not one single thing has ever been accomplished without intention”. When we intentionally set out to do something we plan to fulfil a motive, purpose, or objective as a result. There is a meaning behind the action; a sense of...
by Oshana Jouna | Sep 2, 2024 | CAASM, IoT & Robotics
Introduction The evolution of the humble security camera into a cloud-connected multifunction safety device we see used today has come with a plethora of new capabilities and opportunities for security practitioners. Yet with internet-connected devices come risks....
by Ashish Khanna | Sep 2, 2024 | Risk Management
By Ashish Khanna High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of...
by Tenable | Sep 2, 2024 | Exposure Management, Reports & Predictions, Threat Intelligence
Introduction Tenable®, the exposure management company, has released a research report titled “The Critical Few: How to Expose and Close the Threats that Matter” that identifies the key exposure points within organisations and outlines actionable steps to mitigate...
by Tristan Fong | Aug 30, 2024 | Crypto, Blockchain, and NFTs
Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know...
by Ashley Diffey | Aug 29, 2024 | Identity & Access Management
Banking fraud continues to be a significant and costly challenge for financial institutions in Australia and around the world. As cybercriminals become increasingly sophisticated, they are leveraging advanced technologies, including artificial intelligence (AI), to...
by Pieter Danhieux | Aug 29, 2024 | Cyber Resilience
The challenges faced by IT security teams are increasing by the day. Wider attack surfaces and the emergence of more sophisticated techniques have resulted in approaches that may have worked in the past no longer being sufficient to ensure effective protection....
by Shane Maher | Aug 29, 2024 | Compliance & Legal
The Federal Government’s apparent appetite to compel companies to report when they pay a cybersecurity ransom for the sake of information collection could be Australia’s best chance of materially stamping out bad cyber practices. The question is when and how they do...
by Venky Raju | Aug 23, 2024 | Artificial Intelligence, Microsegmentation, Security Awareness, Threat Intelligence
I’m sure by now you’ve heard enough about the adoption of AI by your favorite cybersecurity vendors. You may have also attended presentations or conference sessions about using AI to improve the speed and accuracy of detecting threats. But what about the offensive...
by Christiaan Beek | Aug 23, 2024 | Security Awareness, Threat Intelligence
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access...
by Rick Vanover | Aug 23, 2024 | Artificial Intelligence, Cyber Resilience, Data Management
Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive...
by James Calder | Aug 23, 2024 | Cyber Resilience, Security Operations
Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the...
by Devasmita Das | Aug 23, 2024 | Microsegmentation, Secure Communications
The Internet of Medical Things (IoMT) is transforming healthcare with its rapidly expanding ecosystem of interconnected devices. As this technology advances, its impact extends beyond traditional clinics and hospitals, projecting the IoT in healthcare market to reach...
by Scott Morris | Aug 22, 2024 | Security Awareness, Social Engineering, Threat Intelligence
Introduction Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not...
by Kerrick Lehman | Aug 19, 2024 | Vendor Management
Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question – how can technology leaders realign...
by John Griffin | Aug 16, 2024 | Leadership, Security Operations
Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include...
by Jason Whyte | Aug 16, 2024 | Cyber Resilience, Security Awareness
A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses...
by Andrew Shea | Aug 14, 2024 | Learning & Education, Security Awareness
Introduction Australia is facing a significant shortfall in the number of cybersecurity professionals needed to defend people, governments and businesses. With AustCyber forecasting a shortfall of almost 17,000 cybersecurity workers by 2026, current efforts by the...
by Technology Brokers Australia | Aug 12, 2024 | Security Operations
Introduction In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many...
by Mohamed Marjook Hussain | Aug 9, 2024 | Security Operations
Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Government’s...
by Colin Garro | Aug 7, 2024 | Risk Management
In today’s fast-paced digital landscape, the adage “time is money” has never been more relevant, especially when it comes to cybersecurity. If you’re taking days or even weeks to report on your current cyber asset risk posture, you’re leaving...
by Tales Sian Lopes | Aug 6, 2024 | Personal Security, Security Awareness
Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission’s report Australians lost AUD $2.74 billion to scams in 2023 –...
by Christoph Nagy | Jul 29, 2024 | Application Security
When looking at a large and complex SAP landscape, some might think that implementing an effective security posture for such an environment is a big and long-term project. We see a lot of tools in the market that provide security for SAP as a service and show results...
by Scott McKinnel | Jul 25, 2024 | Exposure Management, Risk Management
Introduction Australian manufacturers are standing at a critical crossroads as the landscape of both manufacturing and cyber insurance undergo significant shifts. Insurance, while often viewed as a safety net, provides extremely limited coverage when it comes to...