In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing organisations as they allocate resources to fortify their defences was presented. The prevailing sentiment is that merely increasing budgetary allocations may not be the panacea or silver bullet to resolve the myriad of cybersecurity issues that organisations face.
Vermaak commented, "Money, unfortunately, doesn't solve all of our problems as the problems are nuanced across technology people and processes, and just throwing money at the problem won't necessarily resolve it."
It is heartening to note that 85% of organisations anticipate ...
The Voice of Cyber®
Security Operations
Security Operations encompasses the processes, technologies, and personnel responsible for monitoring and responding to security incidents. Security Operations Centres (SOCs) play a central role in this domain, leveraging advanced tools and methodologies to detect, analyse, and mitigate potential cyber threats in real-time. Security Operations involves continuous monitoring of networks, systems, and applications, as well as incident response activities to address and neutralise security incidents promptly.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Growing the size of the security team, and increasing user awareness of the signs of attack, may not be enough to completely eliminate the people problem.
Organisations should follow several key steps to ensure that identity credentials are secure and user authorisations are appropriate.
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into ...
When organisations are hit by ransomware attacks and business operations go down, there’s often a rush to blame. Who’s responsible? Who should resign? Less often is the ...
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly ...
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain ...
In The News
Sort By
- Date
- Title
Cisco Hypershield Brings Power of Hyperscaler Security and Connectivity to the Enterprise
SYDNEY — 16 April 2024 - Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading AI-powered, cloud-delivered cyber security platform provider, today announced new ...
Fujitsu's new consulting division offers tailored solutions, from advanced threat intelligence to rapid response mechanisms, ensuring robust cyber resilience
AI security analyst radically transforms threat investigations and response with simple, one-click hunting, suggested queries, and auto-generated reports, empowering security ...
New SolarWinds survey provides insight from IT pros on the most transformative technologies and the biggest challenges that lie ahead
LogRhythm’s Eighth Quarterly Release Enhances Global Security Communication and Collaboration
Podcasts On Security Operations