by Hamish Soper | Apr 4, 2024 | ANZ, Crisis Management
With over 2000 incidents reported to CERT NZ each quarter, New Zealand is facing an increasing number of cybersecurity attacks. Every organisation, from the smallest business to the largest government department or organisation must now have a plan for how it will...
by Sarwar Khan | Mar 28, 2024 | Sustainability
The Playing Field Over the past several years sustainability has become a growing priority for most, if not all, organisations. Forward-thinking businesses, consumers and governments alike are increasingly looking at how to increase their sustainability efforts, while...
by Edwin Kwan | Mar 25, 2024 | Application Security, Supply Chain
Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...
by Matias Madou | Mar 25, 2024 | Application Security, Artificial Intelligence
Artificial intelligence (AI) engines are starting to populate everywhere, with each new model and version seemingly offering more powerful and impressive capabilities that can be applied in a variety of fields. It’s been suggested AI should be deployed for writing...
by Jamie O'Reilly | Mar 22, 2024 | ANZ, AUKUS, Government & Policy, Social Engineering
Background on Security Clearances in Australia Security Clearance Levels Under the Australian Government Protective Security Policy Framework, individuals who need access to security classified resources must hold a security clearance. This includes classified...
by Scott Hesford | Mar 22, 2024 | Identity & Access Management, Security Operations
Like every facet of information technology, security has been a constantly evolving factor within organisations for decades. In its earliest phase, IT security efforts were focused on protecting the network perimeter, leveraging the classic castle and moat model. The...
by The Production Team | Mar 22, 2024 | Network Security, Security Operations, Threat Intelligence
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a...
by Louise Stigwood | Mar 21, 2024 | Artificial Intelligence, Reports & Predictions, Work & Careers
Amazon Web Services (AWS), an Amazon.com company, today released new research showing that when artificial intelligence (AI) is fully harnessed, Australian workers with AI skills and expertise could see salary hikes of over 29%, with workers in IT (37%), and business...
by Debanjali Ghosh | Mar 21, 2024 | IWD, Work & Careers
Identity management and security are crucial aspects of the modern digital landscape, responsible for protecting the information and access points that link us globally. Thankfully, these areas, filled with complexities and chances for growth, are becoming more...
by Mark Nutt | Mar 21, 2024 | Cyber Resilience, Reports & Predictions, Risk Management, Security Operations
An Overview Whether it’s on international headlines or in local Australian news, headlines of data related business outages, and associated credibility damage are on the rise. From the DP World hack that stranded tens of thousands of shipping containers, to...
by Jim Ivers | Mar 15, 2024 | Application Security, Exposure Management
There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In...
by Brad LaPorte | Mar 15, 2024 | Leadership, Vendor Management
Ensuring and maintaining a robust defense-in-depth strategy requires new technology investments, especially as many standard detection and response technologies can’t stop ransomware and the evasive and sophisticated techniques attackers are commonly using. As a...
by John Penn | Mar 13, 2024 | IWD, Leadership
According to the 2023 Australian Government report ‘State of STEM Gender Equity 2023’, only 15% of STEM jobs are held by women – an under representation that presents a significant opportunity for organisations to advance female participation in this rapidly emerging...
by Mats Thulin | Mar 12, 2024 | Artificial Intelligence, Continuous Business, Critical Infrastructure
In an increasingly interconnected world, the resilience of critical infrastructure is paramount. Disruption to these industries can have serious repercussions on the functioning of a society, so it is vital that those providing these services can maintain business...
by David Marsh | Mar 12, 2024 | Identity & Access Management, SMB
Scams cost Australians more than $3.1 billion each year, with identity crime representing a contributing factor. In response, businesses have increasingly adopted strict security strategies, and more recently, the government has introduced the Digital ID Bill to the...
by The Production Team | Mar 11, 2024 | IWD
“The increasing presence of women in tech and leadership roles is encouraging. The current skills shortage offers a great opportunity for women to step in and fill the gaps. For those eyeing careers in technology, whether it be coding, cybersecurity, data analysis, or...
by Ashley Diffey | Mar 11, 2024 | Identity & Access Management
As the proportion of daily life conducted online continues to climb, people are increasingly concerned by the lack of control they have over their personal data. In fact, 66% of consumers feel they will never be fully in control of their data while only 33% are aware...
by The Production Team | Mar 8, 2024 | IWD
Time flies when you’re having fun, as the old saying has it. I must have been enjoying more than my fair share of it because, from where I sit, the years are racing along! For me, this year’s International Women’s Day comes hot on the heels of a milestone birthday –...
by The Production Team | Mar 8, 2024 | IWD
International Women’s Day provides a wonderful opportunity to reflect: on the enormous strides towards equality and equity our gender has made in recent decades; and on how much further we need to go before the scales are truly balanced. Speaking personally, I’ve seen...
by The Production Team | Mar 8, 2024 | IWD
The world continues to celebrate the achievements and contributions of women across various industries, it’s imperative to remind ourselves of the not so celebratory experiences that women encounter. Suzanne Vos, a recognised international Innovation Leader and...
by The Production Team | Mar 8, 2024 | IWD
The role of vulnerability in companies, specifically within leadership, has had a strong emergence in the workplace due to American Professor and Author Brené Brown. Vermaak leads with “servant-leadership” as the backbone of being a strong leader. It was...
by Kara Sprague | Mar 7, 2024 | IWD
As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since...
by The Production Team | Mar 7, 2024 | IWD
Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and...
by The Production Team | Mar 7, 2024 | IWD
What Does Inspiring Inclusion Mean To You? Inspiring inclusion, from my perspective rooted in my Asian background and experience working for a global company, entails proactively nurturing a space where every person, irrespective of their origins or identity, feels...
by Jason Whyte | Mar 7, 2024 | Data Management, Security Operations
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that...
by Christoph Nagy | Mar 5, 2024 | Application Security, Security Operations
The Extent of Deployment In recent years, cyberattacks against SAP systems have become more common, as 99 of the 100 largest companies in the world are SAP business applications customers with SAP customers generating 87% of total global commerce ($46 trillion),...
by Christoph Nagy | Mar 5, 2024 | Application Security, Artificial Intelligence, Security Operations
Since the rise of ChatGPT, we have seen new use cases for artificial intelligence (AI) in today’s operations almost every day. This trend is certainly also impacting the cybersecurity domain as IT threats are increasing in alignment with the number of...
by Josh Cigna | Mar 1, 2024 | Security Awareness, SMB
If you immediately think of email when you think of phishing, you’re not alone. However, a new form of a text-based scam is making waves – highlighted by a seemingly legitimate text from the USPS which lets receivers know that their “package” arrived at the warehouse....
by Jason Duerden | Feb 29, 2024 | Artificial Intelligence, Security Operations
The State Of Play As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools. Capable of creating everything from text and images to computer...
by Tim Davoren | Feb 28, 2024 | Cloud Security, Security Awareness, Security Operations
Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and...
by Matias Madou | Feb 27, 2024 | Application Security, Product Development
With recent increases in cyberattacks showing no sign of abating, the role software developers need to play to improve levels of protection is becoming more widely understood. Encouragingly, industry research[1] shows nearly four in five developers believe that either...
by Lee Roebig | Feb 26, 2024 | Cloud Security, Leadership, Microsegmentation, OT Security, Security Operations
With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. According to the ASD, the top three causes of cyber incidents in Australia in 2023...
by Sudip Banerjee | Feb 26, 2024 | Security Awareness, Zero Trust
As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive...
by Anthony Daniel | Feb 26, 2024 | Identity & Access Management, Security Operations
Of all the causes of cybersecurity breaches within organisations, one of the most prevalent remains human behaviour. Indeed, according to a Verizon data breach report[1], human error is involved in 74% of data breaches. For this reason, it is vital that security teams...
by Lydia Hopton | Feb 22, 2024 | Governance & Risk
With growing concern and scepticism around the misuse of technology, it’s vital for organisations to have the right safeguards in place to protect their people and the business overall. It starts with the belief that the technology we use must earn our trust if it is...
by Pete Murray | Feb 21, 2024 | Artificial Intelligence, Reports & Predictions, Work & Careers
New research released today by Veritas Technologies shows that confusion over generative AI in the workplace is simultaneously creating a divide between employees while also increasing the risk of exposing sensitive information. More than two-thirds (68%) of...
by Robert M. Lee | Feb 21, 2024 | Geo-Political & Military, Government & Policy, OT Security, Reports & Predictions
Dragos Inc., the global leader in cybersecurity for operational technology (OT) environments, today released its sixth annual Dragos OT Cybersecurity Year in Review report, the most comprehensive report on cyber threats facing industrial organisations. The report...
by Sean Leach | Feb 20, 2024 | Leadership, Security Operations, Vendor Management
The seemingly unending list of threat actors successfully targeting Australian organisations, and a corresponding rise in financial losses and regulatory scrutiny, has firms, leaders and cybersecurity teams on edge. Australian and New Zealand businesses lost almost...
by Glen Maloney | Feb 16, 2024 | Application Security, Artificial Intelligence
Introduction Plain English is becoming increasingly vital in securing APIs against coding errors and business logic abuse, especially as the abuse of APIs by threat actors continues to grow. The current shortage of cybersecurity personnel and the lack of expertise in...
by Sarwar Khan | Feb 15, 2024 | OT Security, Sustainability
Once a marginal topic, sustainability is now critical focus area with commitment required at all levels of the company starting with the Board. It goes well beyond ticking off ESG goals to embedding a culture of change across the organisation – from the set of...
by Jason Whyte | Feb 14, 2024 | Risk Management, Security Awareness
Australia’s business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. As continued technological innovation drives business development, efficiency,...
by Prashanth Nanjundappa | Feb 14, 2024 | Application Security, Artificial Intelligence
An extension of the now popular DevOps process, DevSecOps has become a growing priority for IT professionals in the past decade, and has rapidly evolved to meet new demands and ways of working across organisations heavily reliant on digital processes. It has now...
by Omer Dembinsky | Feb 13, 2024 | Security Awareness, SMB, Social Engineering
As we navigate the digital dimensions of love and affection this Valentine’s Day 2024, the landscape is both vast and fraught with pitfalls. In an eye-opening revelation, January saw the creation of 18,171 new domains containing ‘Valentine’ or...
by Dakota Cary | Feb 13, 2024 | East Asia and Pacific, Geo-Political & Military
Executive Summary China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now...
by Geoffrey Coley | Feb 12, 2024 | Artificial Intelligence, Data Management, Leadership, Vendor Management
Introduction In September 2023, the Australian federal government introduced new rules making the appointment of Chief Information Security Officers (CISOs) at its largest agencies mandatory. This marks an inflection point and recognition of the importance of cyber...
by Nozomi Networks | Feb 9, 2024 | OT Security, Reports & Predictions
The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing...
by Liviu Arsene | Feb 8, 2024 | Digital Forensics, Threat Intelligence
HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling A recent HijackLoader variant employs sophisticated techniques to enhance its complexity and defense evasion CrowdStrike detects this new HijackLoader...
by Vinayak Sreedhar | Feb 7, 2024 | Crisis Management, Exposure Management, Security Awareness
Introduction The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the...