by Scott Hesford | Jun 5, 2024 | Identity & Access Management, Microsegmentation, Security Operations
A recent wave of large-scale password spray attacks has cybersecurity firms scrambling to warn their clients around the world. These attacks exploit weak credentials to gain unauthorised access to critical systems, potentially causing significant financial and...
by Matthew Lowe | Jun 5, 2024 | Critical Infrastructure, Security Awareness, Threat Intelligence
Australia’s energy industry, a critical foundation of the country’s economy, is facing an increasing and potentially costly challenge: ransomware attacks. These cyber assaults, where malicious software encrypts critical data and holds it hostage until a ransom...
by Derek Hanson | Jun 5, 2024 | Identity & Access Management, Security Awareness, Security Operations
Introduction Passwords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest...
by Nubiaa Shabaka | May 30, 2024 | Data Management, Security Awareness
AI is proving to be a transformational technology and its speed and efficiency is already transforming the way we work and live. While there’s still so much to learn about how and where humans will want to integrate this technology into their lives, it’s clear...
by Leon Scott | May 24, 2024 | Leadership, Reports & Predictions, Uncategorized
In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their...
by Shane Maher | May 23, 2024 | Artificial Intelligence, Security Awareness, Security Operations
The rapid transformation of the technological landscape by artificial intelligence (AI) is having a significant impact on cybersecurity. This is most evident in the rise of AI phishing attacks, which pose a growing threat due to their enhanced efficiency and...
by Eyad Shihabi | May 23, 2024 | Cloud Security
From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in...
by George Dragatsis | May 21, 2024 | Data Management, Security Operations
The digital age has ushered in an era of unprecedented connectivity, however it has also created a vast digital landscape ripe for exploitation by cybercriminals. Organisations that once relied on reactive data protection measures like backup and recovery in the face...
by Aaron Sharp | May 21, 2024 | Cyber Resilience, Leadership, Security Operations
Ransomware, phishing, hackers, data loss – the list of cyber threats to enterprises goes on. Threats to cybersecurity have reached ground zero, with social engineering, system intrusion and basic web application attacks representing 93 percent of data breaches...
by The Production Team | May 21, 2024 | Cyber Resilience, Reports & Predictions
In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson’s extensive knowledge and...
by George Moawad | May 20, 2024 | Critical Infrastructure
Introduction With compliance regulations such as Security of Critical Infrastructure (SoCI) evolving rapidly, it is more important than ever for physical security and IT teams to work together to safeguard facilities and network infrastructure. A research report by...
by Scott Hesford | May 20, 2024 | Identity & Access Management
The modern workplace is undergoing a digital revolution – and gone are the days of dedicated workstations and siloed applications. Today’s employees navigate a complex ecosystem of on-premise and cloud-based platforms, each requiring login credentials and...
by James Richmond | May 16, 2024 | Government & Policy, Microsegmentation
Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia’s national growth, underpinning social and economic prosperity. Unsurprisingly, they have become...
by Sairam Anand | May 15, 2024 | Security Awareness
The release of the Australian Competition and Consumer Commission’s (ACCC) 2023 Targeting scams report may come with a sigh of relief. Despite predictions that Australians would lose more than AUD 3.15 billion to scams in 2023, it appears that the combined losses...
by The Production Team | May 14, 2024 | Artificial Intelligence
The Recap In a recent episode of KBKast, Corien Vermaak, Head of cybersecurity from Cisco ANZ, joined host Karissa Breen to discuss the conversation of AI in and cybersecurity. The interview shed light on the opportunities and ethical considerations presented by AI in...
by Ashwin Ram | May 14, 2024 | Leadership, Risk Management
According to Check Point Software’s Threat Intelligence Report on Australia & New Zealand, an organisation in the region has been attacked on average 879 times per week in the last six months. Adding to the complexity for cybersecurity practitioners is the...
by Matias Madou | May 14, 2024 | Application Security, Artificial Intelligence
Large banks and other financial services organisations have proven to be early adopters of AI. In Australia, each of the ‘Big Four’ banks – Westpac, CBA, ANZ and NAB – have invested in AI assistive coding tools to help deliver new features to customers...
by Rachael Greaves | May 14, 2024 | Leadership, Security Operations
After years of warnings and breaches, the business world has accepted that when it comes to cyber-attacks, it’s a matter of ‘when’, not ‘if’. Not a single organisation is immune to a breach – not even the most secretive and cautious. Down under, a KPMG report in 2023...
by The Production Team | May 13, 2024 | Investment
In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a...
by The Production Team | May 10, 2024 | Investment
In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation...
by Geoff Schomburgk | May 7, 2024 | Critical Infrastructure, Cyber Resilience
From government and healthcare, energy and water networks, manufacturing and telecoms, transportation systems and financial networks, billions of people rely on critical infrastructure. Despite these industries differing in how they function, they are all increasingly...
by Felix Berndt | Apr 30, 2024 | Network Security
In our modern world, where enterprises are increasingly reliant on technology, having the right network monitoring in place will help ensure an organisation’s IT infrastructure continues to function at optimum levels and that there are fewer issues with connected...
by Simon Howe | Apr 30, 2024 | Risk Management
In an age where boards and directors are more interested in cybersecurity than ever before – rated by Australian directors as the top-ranking issue keeping them ‘awake at night’ – the best way for CISOs and cybersecurity teams to communicate risk is in...
by Tenable | Apr 24, 2024 | Exposure Management, Threat Intelligence
The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege...
by Jason Whyte | Apr 23, 2024 | Cyber Resilience, Executive Communication, Leadership
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and...
by TAFE NSW | Apr 18, 2024 | Artificial Intelligence, Learning & Education
AI – An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia...
by TAFE NSW | Apr 18, 2024 | Learning & Education
Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase – by 27 per cent from 2021 to 2026.1 From the late...
by Steve Bray | Apr 18, 2024 | Cloud Security
Today, many organisations are trapped in what’s known as a ‘captivity cloud,’ where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across...
by Scott McKinnel | Apr 16, 2024 | Artificial Intelligence, Exposure Management, Security Awareness
Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the...
by Alyssa Blackburn | Apr 15, 2024 | Artificial Intelligence, Data Management
Too often, having strong data processes can be seen as a ‘nice to have’. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more...
by Taggart Matthiesen | Apr 10, 2024 | Artificial Intelligence, Data Management
Australian industry leaders are navigating a complex regulatory environment that is increasingly focused on the integration of Artificial Intelligence (AI) within business operations. This focus is driven by a concern for consumer protection, particularly the safety...
by James Harvey | Apr 8, 2024 | Application Security, Cloud Security
For all of the recent talk about the need for more integrated approaches within IT departments, the reality is that many security teams (SecOps) continue to operate separately from development and operations teams. Security has traditionally been seen as a reactive...
by Scott Hesford | Apr 5, 2024 | Artificial Intelligence, Security Awareness
As more businesses identify new use cases for artificial intelligence (AI), delivering significant benefits, the technology is also being used to create a concerning security threat: deepfake cyberattacks. Deepfake attacks leverage AI to create new identities, steal...
by Guy Brown | Apr 5, 2024 | Leadership, Security Operations
The idea that cybersecurity is a people problem is so often repeated that it has become a truism for the sector. A casual search of “Cybersecurity people problem” returns 341 million results and, unsurprisingly, a wide range of answers to the question: ‘Which people...
by Wayne Philllips | Apr 5, 2024 | Leadership, Work & Careers
In recent years, the role of the Chief Information Security Officer (CISO) has undergone a significant evolution. Once solely focused on technical components such as firewalls and network security, CISOs today are strategic leaders shaping cybersecurity across their...
by Jay Parikh | Apr 4, 2024 | Artificial Intelligence, Microsegmentation
An Overview The rapid adoption of cloud computing has created a paradigm shift in cybersecurity. While the cloud offers numerous benefits, it also introduces new challenges and risks that require fundamentally rethinking our cybersecurity strategies. The cloud’s...
by Hamish Soper | Apr 4, 2024 | ANZ, Crisis Management
With over 2000 incidents reported to CERT NZ each quarter, New Zealand is facing an increasing number of cybersecurity attacks. Every organisation, from the smallest business to the largest government department or organisation must now have a plan for how it will...
by Sarwar Khan | Mar 28, 2024 | Sustainability
The Playing Field Over the past several years sustainability has become a growing priority for most, if not all, organisations. Forward-thinking businesses, consumers and governments alike are increasingly looking at how to increase their sustainability efforts, while...
by Edwin Kwan | Mar 25, 2024 | Application Security, Supply Chain
Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...
by Matias Madou | Mar 25, 2024 | Application Security, Artificial Intelligence
Artificial intelligence (AI) engines are starting to populate everywhere, with each new model and version seemingly offering more powerful and impressive capabilities that can be applied in a variety of fields. It’s been suggested AI should be deployed for writing...
by Jamie O'Reilly | Mar 22, 2024 | ANZ, AUKUS, Government & Policy, Social Engineering
Background on Security Clearances in Australia Security Clearance Levels Under the Australian Government Protective Security Policy Framework, individuals who need access to security classified resources must hold a security clearance. This includes classified...
by Scott Hesford | Mar 22, 2024 | Identity & Access Management, Security Operations
Like every facet of information technology, security has been a constantly evolving factor within organisations for decades. In its earliest phase, IT security efforts were focused on protecting the network perimeter, leveraging the classic castle and moat model. The...
by The Production Team | Mar 22, 2024 | Network Security, Security Operations, Threat Intelligence
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a...
by Louise Stigwood | Mar 21, 2024 | Artificial Intelligence, Reports & Predictions, Work & Careers
Amazon Web Services (AWS), an Amazon.com company, today released new research showing that when artificial intelligence (AI) is fully harnessed, Australian workers with AI skills and expertise could see salary hikes of over 29%, with workers in IT (37%), and business...
by Debanjali Ghosh | Mar 21, 2024 | IWD, Work & Careers
Identity management and security are crucial aspects of the modern digital landscape, responsible for protecting the information and access points that link us globally. Thankfully, these areas, filled with complexities and chances for growth, are becoming more...
by Mark Nutt | Mar 21, 2024 | Cyber Resilience, Reports & Predictions, Risk Management, Security Operations
An Overview Whether it’s on international headlines or in local Australian news, headlines of data related business outages, and associated credibility damage are on the rise. From the DP World hack that stranded tens of thousands of shipping containers, to...
by Jim Ivers | Mar 15, 2024 | Application Security, Exposure Management
There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In...
by Brad LaPorte | Mar 15, 2024 | Leadership, Vendor Management
Ensuring and maintaining a robust defense-in-depth strategy requires new technology investments, especially as many standard detection and response technologies can’t stop ransomware and the evasive and sophisticated techniques attackers are commonly using. As a...