Introduction
Australian organisations face an array of cybersecurity challenges that didnโt exist half a decade ago.
And yet the reliance on traditional security and legacy systems is largely the status quo โ often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities.
A New Approach
Enter human-centric security โ a fundamental first step to enhance the cyber security resilience of Australian companies. This forms part of the Skills component in a broader cybersecurity strategy that should include the five Sโs: Stability, Security, Skills, Sustainability and Sovereignty.
What is Human-Centric Security?
While human-centric security isnโt a ...
The Voice of Cyberยฎ
Security Awareness
Security Awareness involves educating individuals within an organisation about potential cyber threats, safe online practices, and the importance of maintaining a security-conscious mindset. Security Awareness programs aim to empower employees to recognise and mitigate cybersecurity risks, reducing the likelihood of falling victim to social engineering attacks such as phishing or malware. Effective security awareness efforts encompass regular training sessions, simulated phishing exercises, and the dissemination of relevant information to foster a culture of cybersecurity vigilance.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Cybersecurity Awareness Month is an international initiative that focuses on simple ways to protect ourselves, our families, and our businesses from online threats. The 2025 ...
This Cybersecurity Awareness Month, understand why it's unfair to blame humans for every breach. Learn how technology can better support users.
An article around how security solutions designed to strengthen defences can inadvertantly contribute to a fragmented cybersecurity landscape, where unifying risk metrics and ...
Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware ...
Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as ...
In The News
Sort By
- Date
- Title
The ASD just released its Annual Cyber Threat Report and some of the incidents outlined were the result of exploiting public-facing applications and compromised accounts or ...
The bot landscape is changing. Malicious โ or bad bots โ are evolving to become more advanced and human-like in their behavior, while an emerging category of AI bots, which ...
Barracuda threat researchers have identified evolving tactics being used by cybercriminals in targeted sextortion scams. Criminals are now frequently using victimsโ addresses ...
Forescout today published the โUnveiling the Persistent Risks of Connected Medical Devicesโ report. Building on โThe Riskiest Connected Devices in 2024โ report from June, ...
October 30, 2024 โ Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the retail sector, ...
Pwn2Own Ireland underscores Trendโs commitment to securing AI innovations
Podcasts On Security Awareness