by Devasmita Das | Aug 23, 2024 | Microsegmentation, Secure Communications
The Internet of Medical Things (IoMT) is transforming healthcare with its rapidly expanding ecosystem of interconnected devices. As this technology advances, its impact extends beyond traditional clinics and hospitals, projecting the IoT in healthcare market to reach...
by Scott Morris | Aug 22, 2024 | Security Awareness, Social Engineering, Threat Intelligence
Introduction Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not...
by Kerrick Lehman | Aug 19, 2024 | Vendor Management
Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question – how can technology leaders realign...
by John Griffin | Aug 16, 2024 | Leadership, Security Operations
Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include...
by Jason Whyte | Aug 16, 2024 | Cyber Resilience, Security Awareness
A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses...
by Andrew Shea | Aug 14, 2024 | Learning & Education, Security Awareness
Introduction Australia is facing a significant shortfall in the number of cybersecurity professionals needed to defend people, governments and businesses. With AustCyber forecasting a shortfall of almost 17,000 cybersecurity workers by 2026, current efforts by the...
by Technology Brokers Australia | Aug 12, 2024 | Security Operations
Introduction In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many...
by Mohamed Marjook Hussain | Aug 9, 2024 | Security Operations
Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Government’s...
by Colin Garro | Aug 7, 2024 | Risk Management
In today’s fast-paced digital landscape, the adage “time is money” has never been more relevant, especially when it comes to cybersecurity. If you’re taking days or even weeks to report on your current cyber asset risk posture, you’re leaving...
by Tales Sian Lopes | Aug 6, 2024 | Personal Security, Security Awareness
Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission’s report Australians lost AUD $2.74 billion to scams in 2023 –...
by Christoph Nagy | Jul 29, 2024 | Application Security
When looking at a large and complex SAP landscape, some might think that implementing an effective security posture for such an environment is a big and long-term project. We see a lot of tools in the market that provide security for SAP as a service and show results...
by Scott McKinnel | Jul 25, 2024 | Exposure Management, Risk Management
Introduction Australian manufacturers are standing at a critical crossroads as the landscape of both manufacturing and cyber insurance undergo significant shifts. Insurance, while often viewed as a safety net, provides extremely limited coverage when it comes to...
by Brian Moussalli | Jul 23, 2024 | Supply Chain, Threat Intelligence
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a...
by Fortinet | Jul 23, 2024 | Reports & Predictions, Threat Intelligence
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics,...
by William Glasson | Jul 22, 2024 | Compliance & Legal, Data Management
In a time of digital transformation and big data, privacy has never been a bigger concern. An Introduction There seems to be no limit to the number of devices connected to our networks. As internet connectivity becomes more widespread and affordable, more of us can...
by Jeff Lee | Jul 12, 2024 | Cloud Security, Cyber Resilience, Security Operations
The strategic use of cloud technology has become a cornerstone for businesses who wish to stay competitive and adaptable in today’s evolving landscape. However, amidst the rapid enthusiasm to adopt and optimise cloud resources, crucial considerations such as security...
by Stuart Mort | Jul 11, 2024 | Executive Communication, Governance & Risk, Leadership
Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the...
by Sumit Bansal | Jul 11, 2024 | Risk Management, Threat Intelligence
The most effective third-party risk management (TPRM) programmes prioritise risk remediation alongside risk identification. While security ratings services (SRS) have long focused on risk identification, the burden of curation and remediation has traditionally fallen...
by Mina Mousa | Jul 11, 2024 | Cloud Security
Cyber threats are a serious challenge that governments worldwide are dealing with every day. A cyberattack can cause breach of data or information, cost time and money to resolve or cause downtime impacting operations. For the past 10 years, an annual CIO survey in...
by Shane Maher | Jul 3, 2024 | Security Operations, SMB
Introduction The ever-present threat of cyberattacks and a rapidly changing technological landscape have forced organisations of all sizes, particularly small businesses, to prioritise cybersecurity. An increased focus on centralised security operations for companies...
by Mark Jones | Jul 3, 2024 | Leadership, Work & Careers
With AustCyber touting a shortfall of 16,000 cybersecurity professionals by 2026, the race to build the nation’s cybersecurity talent and capacity is on. Organisations of all sizes and across every industry vertical are trying to find skilled people to help protect...
by Sadiq Iqbal | Jul 3, 2024 | Critical Infrastructure, Endpoint Protection
Australian telcos and policymakers alike are increasingly displaying a keen interest in the number of outdated mobile handsets in use in the population. The reason for this is that a sizeable number of mobile users are about to be left behind by the steady march of...
by Pieter Danhieux | Jun 24, 2024 | Application Security, Risk Management, Security Operations
When it comes to enterprise cybersecurity, nothing is set in stone. With a constantly shifting threat landscape on one hand and evolving tools on the other, security teams can often feel overworked and overwhelmed. When you add the additional layer of regulatory...
by Kavitha Mariappan | Jun 7, 2024 | Government & Policy, Leadership, Reports & Predictions
What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure....
by Scott Hesford | Jun 5, 2024 | Identity & Access Management, Microsegmentation, Security Operations
A recent wave of large-scale password spray attacks has cybersecurity firms scrambling to warn their clients around the world. These attacks exploit weak credentials to gain unauthorised access to critical systems, potentially causing significant financial and...
by Matthew Lowe | Jun 5, 2024 | Critical Infrastructure, Security Awareness, Threat Intelligence
Australia’s energy industry, a critical foundation of the country’s economy, is facing an increasing and potentially costly challenge: ransomware attacks. These cyber assaults, where malicious software encrypts critical data and holds it hostage until a ransom...
by Derek Hanson | Jun 5, 2024 | Identity & Access Management, Security Awareness, Security Operations
Introduction Passwords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest...
by Nubiaa Shabaka | May 30, 2024 | Data Management, Security Awareness
AI is proving to be a transformational technology and its speed and efficiency is already transforming the way we work and live. While there’s still so much to learn about how and where humans will want to integrate this technology into their lives, it’s clear...
by Leon Scott | May 24, 2024 | Leadership, Reports & Predictions, Uncategorized
In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their...
by Shane Maher | May 23, 2024 | Artificial Intelligence, Security Awareness, Security Operations
The rapid transformation of the technological landscape by artificial intelligence (AI) is having a significant impact on cybersecurity. This is most evident in the rise of AI phishing attacks, which pose a growing threat due to their enhanced efficiency and...
by Eyad Shihabi | May 23, 2024 | Cloud Security
From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in...
by George Dragatsis | May 21, 2024 | Data Management, Security Operations
The digital age has ushered in an era of unprecedented connectivity, however it has also created a vast digital landscape ripe for exploitation by cybercriminals. Organisations that once relied on reactive data protection measures like backup and recovery in the face...
by Aaron Sharp | May 21, 2024 | Cyber Resilience, Leadership, Security Operations
Ransomware, phishing, hackers, data loss – the list of cyber threats to enterprises goes on. Threats to cybersecurity have reached ground zero, with social engineering, system intrusion and basic web application attacks representing 93 percent of data breaches...
by The Production Team | May 21, 2024 | Cyber Resilience, Reports & Predictions
In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson’s extensive knowledge and...
by George Moawad | May 20, 2024 | Critical Infrastructure
Introduction With compliance regulations such as Security of Critical Infrastructure (SoCI) evolving rapidly, it is more important than ever for physical security and IT teams to work together to safeguard facilities and network infrastructure. A research report by...
by Scott Hesford | May 20, 2024 | Identity & Access Management
The modern workplace is undergoing a digital revolution – and gone are the days of dedicated workstations and siloed applications. Today’s employees navigate a complex ecosystem of on-premise and cloud-based platforms, each requiring login credentials and...
by James Richmond | May 16, 2024 | Government & Policy, Microsegmentation, Telco
Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia’s national growth, underpinning social and economic prosperity. Unsurprisingly, they have become...
by Sairam Anand | May 15, 2024 | Security Awareness
The release of the Australian Competition and Consumer Commission’s (ACCC) 2023 Targeting scams report may come with a sigh of relief. Despite predictions that Australians would lose more than AUD 3.15 billion to scams in 2023, it appears that the combined losses...
by The Production Team | May 14, 2024 | Artificial Intelligence
The Recap In a recent episode of KBKast, Corien Vermaak, Head of cybersecurity from Cisco ANZ, joined host Karissa Breen to discuss the conversation of AI in and cybersecurity. The interview shed light on the opportunities and ethical considerations presented by AI in...
by Ashwin Ram | May 14, 2024 | Leadership, Risk Management
According to Check Point Software’s Threat Intelligence Report on Australia & New Zealand, an organisation in the region has been attacked on average 879 times per week in the last six months. Adding to the complexity for cybersecurity practitioners is the...
by Matias Madou | May 14, 2024 | Application Security, Artificial Intelligence
Large banks and other financial services organisations have proven to be early adopters of AI. In Australia, each of the ‘Big Four’ banks – Westpac, CBA, ANZ and NAB – have invested in AI assistive coding tools to help deliver new features to customers...
by Rachael Greaves | May 14, 2024 | Leadership, Security Operations
After years of warnings and breaches, the business world has accepted that when it comes to cyber-attacks, it’s a matter of ‘when’, not ‘if’. Not a single organisation is immune to a breach – not even the most secretive and cautious. Down under, a KPMG report in 2023...
by The Production Team | May 13, 2024 | Investment
In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a...
by The Production Team | May 10, 2024 | Investment
In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation...
by Geoff Schomburgk | May 7, 2024 | Critical Infrastructure, Cyber Resilience
From government and healthcare, energy and water networks, manufacturing and telecoms, transportation systems and financial networks, billions of people rely on critical infrastructure. Despite these industries differing in how they function, they are all increasingly...
by Felix Berndt | Apr 30, 2024 | Network Security
In our modern world, where enterprises are increasingly reliant on technology, having the right network monitoring in place will help ensure an organisation’s IT infrastructure continues to function at optimum levels and that there are fewer issues with connected...
by Simon Howe | Apr 30, 2024 | Risk Management
In an age where boards and directors are more interested in cybersecurity than ever before – rated by Australian directors as the top-ranking issue keeping them ‘awake at night’ – the best way for CISOs and cybersecurity teams to communicate risk is in...
by Tenable | Apr 24, 2024 | Exposure Management, Threat Intelligence
The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege...