Register
Editors Pick
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, ... Read More
Dark Web Shows Cybercriminals Ready For Olympics. Are you?
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World ... Read More
How Privacy-By-Design Is Influencing Australia’s Physical Security Environments
When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding that into IT systems, networked infrastructure, and business practices from the first line of code to third-party vendors. Read More
Why CISOs Need a Voice In the Boardroom
Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level ... Read More
Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction
Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem. Read More
Three Force Multipliers To Boost Cybersecurity Protections For Governments
Government departments, agencies and councils are looking to invest in capabilities and tooling that can act as ‘force multipliers’ for improving their protective coverage against cybersecurity threats. Read More