by Brian Moussalli | Jul 23, 2024 | Supply Chain, Threat Intelligence
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a...
by Fortinet | Jul 23, 2024 | Reports & Predictions, Threat Intelligence
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics,...
by William Glasson | Jul 22, 2024 | Compliance & Legal, Data Management
In a time of digital transformation and big data, privacy has never been a bigger concern. An Introduction There seems to be no limit to the number of devices connected to our networks. As internet connectivity becomes more widespread and affordable, more of us can...
by Jeff Lee | Jul 12, 2024 | Cloud Security, Cyber Resilience, Security Operations
The strategic use of cloud technology has become a cornerstone for businesses who wish to stay competitive and adaptable in today’s evolving landscape. However, amidst the rapid enthusiasm to adopt and optimise cloud resources, crucial considerations such as security...
by Stuart Mort | Jul 11, 2024 | Executive Communication, Governance & Risk, Leadership
Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the...
by Sumit Bansal | Jul 11, 2024 | Risk Management, Threat Intelligence
The most effective third-party risk management (TPRM) programmes prioritise risk remediation alongside risk identification. While security ratings services (SRS) have long focused on risk identification, the burden of curation and remediation has traditionally fallen...
by Mina Mousa | Jul 11, 2024 | Cloud Security
Cyber threats are a serious challenge that governments worldwide are dealing with every day. A cyberattack can cause breach of data or information, cost time and money to resolve or cause downtime impacting operations. For the past 10 years, an annual CIO survey in...
by Shane Maher | Jul 3, 2024 | Security Operations, SMB
Introduction The ever-present threat of cyberattacks and a rapidly changing technological landscape have forced organisations of all sizes, particularly small businesses, to prioritise cybersecurity. An increased focus on centralised security operations for companies...
by Mark Jones | Jul 3, 2024 | Leadership, Work & Careers
With AustCyber touting a shortfall of 16,000 cybersecurity professionals by 2026, the race to build the nation’s cybersecurity talent and capacity is on. Organisations of all sizes and across every industry vertical are trying to find skilled people to help protect...
by Sadiq Iqbal | Jul 3, 2024 | Critical Infrastructure, Endpoint Protection
Australian telcos and policymakers alike are increasingly displaying a keen interest in the number of outdated mobile handsets in use in the population. The reason for this is that a sizeable number of mobile users are about to be left behind by the steady march of...
by Pieter Danhieux | Jun 24, 2024 | Application Security, Risk Management, Security Operations
When it comes to enterprise cybersecurity, nothing is set in stone. With a constantly shifting threat landscape on one hand and evolving tools on the other, security teams can often feel overworked and overwhelmed. When you add the additional layer of regulatory...
by Kavitha Mariappan | Jun 7, 2024 | Government & Policy, Leadership, Reports & Predictions
What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure....
by Scott Hesford | Jun 5, 2024 | Identity & Access Management, Microsegmentation, Security Operations
A recent wave of large-scale password spray attacks has cybersecurity firms scrambling to warn their clients around the world. These attacks exploit weak credentials to gain unauthorised access to critical systems, potentially causing significant financial and...
by Matthew Lowe | Jun 5, 2024 | Critical Infrastructure, Security Awareness, Threat Intelligence
Australia’s energy industry, a critical foundation of the country’s economy, is facing an increasing and potentially costly challenge: ransomware attacks. These cyber assaults, where malicious software encrypts critical data and holds it hostage until a ransom...
by Derek Hanson | Jun 5, 2024 | Identity & Access Management, Security Awareness, Security Operations
Introduction Passwords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest...
by Nubiaa Shabaka | May 30, 2024 | Data Management, Security Awareness
AI is proving to be a transformational technology and its speed and efficiency is already transforming the way we work and live. While there’s still so much to learn about how and where humans will want to integrate this technology into their lives, it’s clear...
by Leon Scott | May 24, 2024 | Leadership, Reports & Predictions, Uncategorized
In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their...
by Shane Maher | May 23, 2024 | Artificial Intelligence, Security Awareness, Security Operations
The rapid transformation of the technological landscape by artificial intelligence (AI) is having a significant impact on cybersecurity. This is most evident in the rise of AI phishing attacks, which pose a growing threat due to their enhanced efficiency and...
by Eyad Shihabi | May 23, 2024 | Cloud Security
From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in...
by George Dragatsis | May 21, 2024 | Data Management, Security Operations
The digital age has ushered in an era of unprecedented connectivity, however it has also created a vast digital landscape ripe for exploitation by cybercriminals. Organisations that once relied on reactive data protection measures like backup and recovery in the face...
by Aaron Sharp | May 21, 2024 | Cyber Resilience, Leadership, Security Operations
Ransomware, phishing, hackers, data loss – the list of cyber threats to enterprises goes on. Threats to cybersecurity have reached ground zero, with social engineering, system intrusion and basic web application attacks representing 93 percent of data breaches...
by The Production Team | May 21, 2024 | Cyber Resilience, Reports & Predictions
In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson’s extensive knowledge and...
by George Moawad | May 20, 2024 | Critical Infrastructure
Introduction With compliance regulations such as Security of Critical Infrastructure (SoCI) evolving rapidly, it is more important than ever for physical security and IT teams to work together to safeguard facilities and network infrastructure. A research report by...
by Scott Hesford | May 20, 2024 | Identity & Access Management
The modern workplace is undergoing a digital revolution – and gone are the days of dedicated workstations and siloed applications. Today’s employees navigate a complex ecosystem of on-premise and cloud-based platforms, each requiring login credentials and...
by James Richmond | May 16, 2024 | Government & Policy, Microsegmentation, Telco
Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia’s national growth, underpinning social and economic prosperity. Unsurprisingly, they have become...
by Sairam Anand | May 15, 2024 | Security Awareness
The release of the Australian Competition and Consumer Commission’s (ACCC) 2023 Targeting scams report may come with a sigh of relief. Despite predictions that Australians would lose more than AUD 3.15 billion to scams in 2023, it appears that the combined losses...
by The Production Team | May 14, 2024 | Artificial Intelligence
The Recap In a recent episode of KBKast, Corien Vermaak, Head of cybersecurity from Cisco ANZ, joined host Karissa Breen to discuss the conversation of AI in and cybersecurity. The interview shed light on the opportunities and ethical considerations presented by AI in...
by Ashwin Ram | May 14, 2024 | Leadership, Risk Management
According to Check Point Software’s Threat Intelligence Report on Australia & New Zealand, an organisation in the region has been attacked on average 879 times per week in the last six months. Adding to the complexity for cybersecurity practitioners is the...
by Matias Madou | May 14, 2024 | Application Security, Artificial Intelligence
Large banks and other financial services organisations have proven to be early adopters of AI. In Australia, each of the ‘Big Four’ banks – Westpac, CBA, ANZ and NAB – have invested in AI assistive coding tools to help deliver new features to customers...
by Rachael Greaves | May 14, 2024 | Leadership, Security Operations
After years of warnings and breaches, the business world has accepted that when it comes to cyber-attacks, it’s a matter of ‘when’, not ‘if’. Not a single organisation is immune to a breach – not even the most secretive and cautious. Down under, a KPMG report in 2023...
by The Production Team | May 13, 2024 | Investment
In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a...
by The Production Team | May 10, 2024 | Investment
In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation...
by Geoff Schomburgk | May 7, 2024 | Critical Infrastructure, Cyber Resilience
From government and healthcare, energy and water networks, manufacturing and telecoms, transportation systems and financial networks, billions of people rely on critical infrastructure. Despite these industries differing in how they function, they are all increasingly...
by Felix Berndt | Apr 30, 2024 | Network Security
In our modern world, where enterprises are increasingly reliant on technology, having the right network monitoring in place will help ensure an organisation’s IT infrastructure continues to function at optimum levels and that there are fewer issues with connected...
by Simon Howe | Apr 30, 2024 | Risk Management
In an age where boards and directors are more interested in cybersecurity than ever before – rated by Australian directors as the top-ranking issue keeping them ‘awake at night’ – the best way for CISOs and cybersecurity teams to communicate risk is in...
by Tenable | Apr 24, 2024 | Exposure Management, Threat Intelligence
The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege...
by Jason Whyte | Apr 23, 2024 | Cyber Resilience, Executive Communication, Leadership
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and...
by TAFE NSW | Apr 18, 2024 | Artificial Intelligence, Learning & Education
AI – An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia...
by TAFE NSW | Apr 18, 2024 | Learning & Education
Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase – by 27 per cent from 2021 to 2026.1 From the late...
by Steve Bray | Apr 18, 2024 | Cloud Security
Today, many organisations are trapped in what’s known as a ‘captivity cloud,’ where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across...
by Scott McKinnel | Apr 16, 2024 | Artificial Intelligence, Exposure Management, Security Awareness
Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the...
by Alyssa Blackburn | Apr 15, 2024 | Artificial Intelligence, Data Management
Too often, having strong data processes can be seen as a ‘nice to have’. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more...
by Taggart Matthiesen | Apr 10, 2024 | Artificial Intelligence, Data Management
Australian industry leaders are navigating a complex regulatory environment that is increasingly focused on the integration of Artificial Intelligence (AI) within business operations. This focus is driven by a concern for consumer protection, particularly the safety...
by James Harvey | Apr 8, 2024 | Application Security, Cloud Security
For all of the recent talk about the need for more integrated approaches within IT departments, the reality is that many security teams (SecOps) continue to operate separately from development and operations teams. Security has traditionally been seen as a reactive...
by Scott Hesford | Apr 5, 2024 | Artificial Intelligence, Security Awareness
As more businesses identify new use cases for artificial intelligence (AI), delivering significant benefits, the technology is also being used to create a concerning security threat: deepfake cyberattacks. Deepfake attacks leverage AI to create new identities, steal...
by Guy Brown | Apr 5, 2024 | Leadership, Security Operations
The idea that cybersecurity is a people problem is so often repeated that it has become a truism for the sector. A casual search of “Cybersecurity people problem” returns 341 million results and, unsurprisingly, a wide range of answers to the question: ‘Which people...
by Wayne Philllips | Apr 5, 2024 | Leadership, Work & Careers
In recent years, the role of the Chief Information Security Officer (CISO) has undergone a significant evolution. Once solely focused on technical components such as firewalls and network security, CISOs today are strategic leaders shaping cybersecurity across their...
by Jay Parikh | Apr 4, 2024 | Artificial Intelligence, Microsegmentation
An Overview The rapid adoption of cloud computing has created a paradigm shift in cybersecurity. While the cloud offers numerous benefits, it also introduces new challenges and risks that require fundamentally rethinking our cybersecurity strategies. The cloud’s...