by John Penn | Mar 13, 2024 | IWD, Leadership
According to the 2023 Australian Government report ‘State of STEM Gender Equity 2023’, only 15% of STEM jobs are held by women – an under representation that presents a significant opportunity for organisations to advance female participation in this rapidly emerging...
by Mats Thulin | Mar 12, 2024 | Artificial Intelligence, Critical Infrastructure
In an increasingly interconnected world, the resilience of critical infrastructure is paramount. Disruption to these industries can have serious repercussions on the functioning of a society, so it is vital that those providing these services can maintain business...
by David Marsh | Mar 12, 2024 | Identity & Access Management, SMB
Scams cost Australians more than $3.1 billion each year, with identity crime representing a contributing factor. In response, businesses have increasingly adopted strict security strategies, and more recently, the government has introduced the Digital ID Bill to the...
by The Production Team | Mar 11, 2024 | IWD
“The increasing presence of women in tech and leadership roles is encouraging. The current skills shortage offers a great opportunity for women to step in and fill the gaps. For those eyeing careers in technology, whether it be coding, cybersecurity, data analysis, or...
by Ashley Diffey | Mar 11, 2024 | Identity & Access Management
As the proportion of daily life conducted online continues to climb, people are increasingly concerned by the lack of control they have over their personal data. In fact, 66% of consumers feel they will never be fully in control of their data while only 33% are aware...
by The Production Team | Mar 8, 2024 | IWD
Time flies when you’re having fun, as the old saying has it. I must have been enjoying more than my fair share of it because, from where I sit, the years are racing along! For me, this year’s International Women’s Day comes hot on the heels of a milestone birthday –...
by The Production Team | Mar 8, 2024 | IWD
International Women’s Day provides a wonderful opportunity to reflect: on the enormous strides towards equality and equity our gender has made in recent decades; and on how much further we need to go before the scales are truly balanced. Speaking personally, I’ve seen...
by The Production Team | Mar 8, 2024 | IWD
The world continues to celebrate the achievements and contributions of women across various industries, it’s imperative to remind ourselves of the not so celebratory experiences that women encounter. Suzanne Vos, a recognised international Innovation Leader and...
by The Production Team | Mar 8, 2024 | IWD
The role of vulnerability in companies, specifically within leadership, has had a strong emergence in the workplace due to American Professor and Author Brené Brown. Vermaak leads with “servant-leadership” as the backbone of being a strong leader. It was...
by Kara Sprague | Mar 7, 2024 | IWD
As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since...
by The Production Team | Mar 7, 2024 | IWD
Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and...
by The Production Team | Mar 7, 2024 | IWD
What Does Inspiring Inclusion Mean To You? Inspiring inclusion, from my perspective rooted in my Asian background and experience working for a global company, entails proactively nurturing a space where every person, irrespective of their origins or identity, feels...
by Jason Whyte | Mar 7, 2024 | Data Management, Security Operations
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that...
by Christoph Nagy | Mar 5, 2024 | Application Security, Security Operations
The Extent of Deployment In recent years, cyberattacks against SAP systems have become more common, as 99 of the 100 largest companies in the world are SAP business applications customers with SAP customers generating 87% of total global commerce ($46 trillion),...
by Christoph Nagy | Mar 5, 2024 | Application Security, Artificial Intelligence, Security Operations
Since the rise of ChatGPT, we have seen new use cases for artificial intelligence (AI) in today’s operations almost every day. This trend is certainly also impacting the cybersecurity domain as IT threats are increasing in alignment with the number of...
by Josh Cigna | Mar 1, 2024 | Security Awareness, SMB
If you immediately think of email when you think of phishing, you’re not alone. However, a new form of a text-based scam is making waves – highlighted by a seemingly legitimate text from the USPS which lets receivers know that their “package” arrived at the warehouse....
by Jason Duerden | Feb 29, 2024 | Artificial Intelligence, Security Operations
The State Of Play As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools. Capable of creating everything from text and images to computer...
by Tim Davoren | Feb 28, 2024 | Cloud Security, Security Awareness, Security Operations
Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and...
by Matias Madou | Feb 27, 2024 | Application Security, Product Development
With recent increases in cyberattacks showing no sign of abating, the role software developers need to play to improve levels of protection is becoming more widely understood. Encouragingly, industry research[1] shows nearly four in five developers believe that either...
by Lee Roebig | Feb 26, 2024 | Cloud Security, Leadership, Microsegmentation, OT Security, Security Operations
With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. According to the ASD, the top three causes of cyber incidents in Australia in 2023...
by Sudip Banerjee | Feb 26, 2024 | Security Awareness, Zero Trust
As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive...
by Anthony Daniel | Feb 26, 2024 | Identity & Access Management, Security Operations
Of all the causes of cybersecurity breaches within organisations, one of the most prevalent remains human behaviour. Indeed, according to a Verizon data breach report[1], human error is involved in 74% of data breaches. For this reason, it is vital that security teams...
by Lydia Hopton | Feb 22, 2024 | Governance & Risk
With growing concern and scepticism around the misuse of technology, it’s vital for organisations to have the right safeguards in place to protect their people and the business overall. It starts with the belief that the technology we use must earn our trust if it is...
by Pete Murray | Feb 21, 2024 | Artificial Intelligence, Reports & Predictions, Work & Careers
New research released today by Veritas Technologies shows that confusion over generative AI in the workplace is simultaneously creating a divide between employees while also increasing the risk of exposing sensitive information. More than two-thirds (68%) of...
by Robert M. Lee | Feb 21, 2024 | Geo-Political & Military, Government & Policy, OT Security, Reports & Predictions
Dragos Inc., the global leader in cybersecurity for operational technology (OT) environments, today released its sixth annual Dragos OT Cybersecurity Year in Review report, the most comprehensive report on cyber threats facing industrial organisations. The report...
by Sean Leach | Feb 20, 2024 | Leadership, Security Operations, Vendor Management
The seemingly unending list of threat actors successfully targeting Australian organisations, and a corresponding rise in financial losses and regulatory scrutiny, has firms, leaders and cybersecurity teams on edge. Australian and New Zealand businesses lost almost...
by Glen Maloney | Feb 16, 2024 | Application Security, Artificial Intelligence
Introduction Plain English is becoming increasingly vital in securing APIs against coding errors and business logic abuse, especially as the abuse of APIs by threat actors continues to grow. The current shortage of cybersecurity personnel and the lack of expertise in...
by Sarwar Khan | Feb 15, 2024 | OT Security, Sustainability
Once a marginal topic, sustainability is now critical focus area with commitment required at all levels of the company starting with the Board. It goes well beyond ticking off ESG goals to embedding a culture of change across the organisation – from the set of...
by Jason Whyte | Feb 14, 2024 | Risk Management, Security Awareness
Australia’s business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. As continued technological innovation drives business development, efficiency,...
by Prashanth Nanjundappa | Feb 14, 2024 | Application Security, Artificial Intelligence
An extension of the now popular DevOps process, DevSecOps has become a growing priority for IT professionals in the past decade, and has rapidly evolved to meet new demands and ways of working across organisations heavily reliant on digital processes. It has now...
by Omer Dembinsky | Feb 13, 2024 | Security Awareness, SMB, Social Engineering
As we navigate the digital dimensions of love and affection this Valentine’s Day 2024, the landscape is both vast and fraught with pitfalls. In an eye-opening revelation, January saw the creation of 18,171 new domains containing ‘Valentine’ or...
by Dakota Cary | Feb 13, 2024 | East Asia and Pacific, Geo-Political & Military
Executive Summary China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now...
by Geoffrey Coley | Feb 12, 2024 | Artificial Intelligence, Data Management, Leadership, Vendor Management
Introduction In September 2023, the Australian federal government introduced new rules making the appointment of Chief Information Security Officers (CISOs) at its largest agencies mandatory. This marks an inflection point and recognition of the importance of cyber...
by Nozomi Networks | Feb 9, 2024 | OT Security, Reports & Predictions
The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing...
by Liviu Arsene | Feb 8, 2024 | Digital Forensics, Threat Intelligence
HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling A recent HijackLoader variant employs sophisticated techniques to enhance its complexity and defense evasion CrowdStrike detects this new HijackLoader...
by Vinayak Sreedhar | Feb 7, 2024 | Crisis Management, Exposure Management, Security Awareness
Introduction The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the...
by Jamie O'Reilly | Feb 6, 2024 | Security Awareness
Protecting your business online used to be more simple. You had your IPs, domains and devices; there wasn’t much more to it. But in the race for companies to get more eyes on products faster than ever and to as big an audience as possible, companies are...
by Aaron Bugal | Feb 6, 2024 | Leadership, Reports & Predictions, Security Operations
Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth “The Future of Cybersecurity in Asia Pacific and Japan” report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of...
by Nam Lam | Feb 6, 2024 | Artificial Intelligence, Identity & Access Management, Reports & Predictions
The cyber security landscape is grappling with an expanding attack vector as the rise in identities from digitisation has exposed organisations to increased vulnerabilities. The challenge is most organisations haven’t yet implemented a comprehensive identity security...
by Jason Baden | Feb 5, 2024 | Application Security, Cyber Resilience, Reports & Predictions
2024 is upon us and Australia and New Zealand stand as vibrant hubs of innovation and technological evolution. The Antipodes are set to witness transformative trends in both technology and cybersecurity that promise to shape the digital frontier. In Australia, the...
by The Production Team | Feb 1, 2024 | AUKUS, Investment
BOKA, a global investment group, with headquarters in London is revolutionising the deep tech sector by identifying, funding, and enabling companies that can address critical National Security mission needs for the AUKUS Alliance which include the United States, the...
by The Production Team | Feb 1, 2024 | SMB
As parents get their kids back to school, it’s not just school excursions and homework that are discussion topics, so will cyberbullying. In the wake of a disturbing surge in cyberbullying incidents, Australian parents and carers are being called to arms to reinforce...
by The Production Team | Jan 30, 2024 | Exposure Management, Reports & Predictions
Introduction Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control. On...
by Raluca Saceanu | Jan 30, 2024 | Artificial Intelligence, Geo-Political & Military, Reports & Predictions
As we enter 2024, Raluca Saceanu, CEO of Smarttech247, a London-listed company specialising in AI-enhanced cybersecurity services with a focus on automated managed detection and response, offers insights into the evolving threat landscape and the four key global...
by The Production Team | Jan 30, 2024 | Reports & Predictions, Security Awareness
SMS services remain a critical part of telecommunications; they don’t require Internet access, and companies use them to inform their customers. This combination of features makes them incredibly useful for criminals who use the technology as a stepping stone in...
by The Production Team | Jan 27, 2024 | Artificial Intelligence, Data Management, Zero Trust
The National Cybersecurity Alliance (NCA) announced its third annual Data Privacy Week campaign from January 22nd to January 27th. The focus is on educating people about the importance of digital privacy in today’s world of constant data collection through...
by Jo Stewart-Rattray | Jan 25, 2024 | Data Management, Security Awareness
Despite new updates to privacy regulations across the globe, including Australia’s Privacy Act Review Report in 2023, only 39 percent of Oceania respondents say they find it easy to understand their organisation’s privacy obligations, according to ISACA’s Privacy in...
by Silas Barnes | Jan 24, 2024 | Crisis Management, Security Operations
Introduction While threat actors lean heavily on technology to execute cyber-attacks, much of their focus is on exploiting individuals. Focused on exfiltrating data and stealing money, criminals manipulate people through deception. Developing a security culture that...