By Ashish Khanna High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of...
Introduction Tenableยฎ, the exposure management company, has released a research report titled โThe Critical Few: How to Expose and Close the Threats that Matterโ that identifies the key exposure points within organisations and outlines actionable steps to mitigate...
Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know...
Banking fraud continues to be a significant and costly challenge for financial institutions in Australia and around the world. As cybercriminals become increasingly sophisticated, they are leveraging advanced technologies, including artificial intelligence (AI), to...
The challenges faced by IT security teams are increasing by the day. Wider attack surfaces and the emergence of more sophisticated techniques have resulted in approaches that may have worked in the past no longer being sufficient to ensure effective protection....
The Federal Governmentโs apparent appetite to compel companies to report when they pay a cybersecurity ransom for the sake of information collection could be Australiaโs best chance of materially stamping out bad cyber practices. The question is when and how they do...
Iโm sure by now youโve heard enough about the adoption of AI by your favorite cybersecurity vendors.ย You may have also attended presentations or conference sessions about using AI to improve the speed and accuracy of detecting threats.ย But what about the offensive...
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access...
Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive...
Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, itโs a critical business imperative. Consequently, the...
The Internet of Medical Things (IoMT) is transforming healthcare with its rapidly expanding ecosystem of interconnected devices. As this technology advances, its impact extends beyond traditional clinics and hospitals, projecting the IoT in healthcare market to reach...
Introduction Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or โadwareโ, a term associated with nuisances and not...