Dumping Ground
Start:
Start:
End:

Register

Editors Pick

From Reactive To Proactive Defence In Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers The Unknown

Nadir Izrael, Co-Founder & CTO, Armis explains how AI-powered threat intelligence can better protect critical infrastructure and national security, as Australian organisations face enhanced cyber security obligations.

Data Privacy Day – Qualys Shares Insights For Effective Data Security

Sam Salehi, Managing Director ANZ at Qualys shares insights for effective data security.

Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy

Olly Stimpson, Senior Security Strategy Adviser ANZ at CyberArk provides his recommendations for organisations to protect privacy in the lead up to Data Privacy Day.

Cybersecurity In 2025: What Will And Needs To Transpire

In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand threats. 2025 should be the Year of the SBOM (Software Bill of Materials). We MUST know as much about our own software – AND all third party software we deploy on our own behalf – as we do about our endpoints, servers and VMs. We can look forward to a much lower tolerance level for employees and third parties who do not align with our maturing cybersecurity policies in the future.

Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and ...
No results found.
No results found.
Protecting Data from Ransomware: The Power of Advanced Encryption

Protecting Data from Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered encryption (PQE) and homomorphic encryption, can protect sensitive data at rest and in transit, rendering stolen information useless to attackers. By focusing on data confidentiality, businesses can reduce the leverage attackers hold in extortion scenarios. However, the article emphasises that encryption alone is not enough—organisations must also maintain robust cybersecurity practices, such as regular backups and proactive threat management, to stay resilient in the face of ransomware. Read More

Tackling Takedowns – How To Mitigate Risks of Fake Domains

Tackling Takedowns – How To Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified. Read More

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience. Read More

Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ownership of their security practices. Read More

Protecting Data from Ransomware: The Power of Advanced Encryption

Protecting Data from Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered encryption (PQE) and homomorphic encryption, can protect sensitive data at rest and in transit, rendering stolen information useless to attackers. By focusing on data confidentiality, businesses can reduce the leverage attackers hold in extortion scenarios. However, the article emphasises ... Read More

Tackling Takedowns – How To Mitigate Risks of Fake Domains

Tackling Takedowns – How To Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified. Read More

Share This