From government and healthcare, energy and water networks, manufacturing and telecoms, transportation systems and financial networks, billions of people rely on critical infrastructure. Despite these industries differing in how they function, they are all increasingly relying on an internet connection to help them deliver their services.
Critical infrastructure are the physical and digital shared systems that help societies, businesses and service providers function. However, its increased reliance on connectivity is making it vulnerable to cyber attacks. Such attacks can be motivated both by cybercriminals looking to make an ‘easy profit’ or rival nation-states looking to cause disruption or acquire ...
The Voice of Cyber®
TECHNOLOGY
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
For all of the recent talk about the need for more integrated approaches within IT departments, the reality is that many security teams (SecOps) continue to operate ...
With deep fakes becoming an increasing cybersecurity issue, there are seven key strategies that organisations can follow to reduce their chances of falling victim to an attack.
Growing the size of the security team, and increasing user awareness of the signs of attack, may not be enough to completely eliminate the people problem.
An Overview
The rapid adoption of cloud computing has created a paradigm shift in cybersecurity. While the cloud offers numerous benefits, it also introduces new challenges ...
. Our dependency on open-source component is going to increase over time and implementing these five steps will help secure your organisation's software supply chain.
The future is a human-AI partnership for secure code development.
In The News
Sort By
- Date
- Title
F5 has today announced the crucial role it plays in securing Australian Government agencies with a wide range of agreements across local, state, and federal levels.
In ...
Report highlights how technological advancements breed stronger cloud threats as 91% express concern over emerging risks and zero-day attacks
AUSCERT, one of Australia's only computer emergency response team’s (CERT), and one of the oldest CERTs in the world, today announces the appointment of Dr Ivano Bongiovanni ...
Groundbreaking EASM engine empowers cybersecurity teams with accurate, real-time view of asset inventory that reduces false positives
New OpenText White Paper Reveals How Data Privacy Issues Are Shaping Australian Purchasing Decisions
New OpenText white paper reveals how data privacy issues are shaping Australian purchasing decisions.
Preemptive approach to cybersecurity showcased at RSAC USA North Hall 4235
Podcasts On TECHNOLOGY