In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing organisations as they allocate resources to fortify their defences was presented. The prevailing sentiment is that merely increasing budgetary allocations may not be the panacea or silver bullet to resolve the myriad of cybersecurity issues that organisations face.
Vermaak commented, "Money, unfortunately, doesn't solve all of our problems as the problems are nuanced across technology people and processes, and just throwing money at the problem won't necessarily resolve it."
It is heartening to note that 85% of organisations anticipate ...
The Voice of Cyber®
Security Operations
Security Operations encompasses the processes, technologies, and personnel responsible for monitoring and responding to security incidents. Security Operations Centres (SOCs) play a central role in this domain, leveraging advanced tools and methodologies to detect, analyse, and mitigate potential cyber threats in real-time. Security Operations involves continuous monitoring of networks, systems, and applications, as well as incident response activities to address and neutralise security incidents promptly.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Growing the size of the security team, and increasing user awareness of the signs of attack, may not be enough to completely eliminate the people problem.
Organisations should follow several key steps to ensure that identity credentials are secure and user authorisations are appropriate.
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into ...
When organisations are hit by ransomware attacks and business operations go down, there’s often a rush to blame. Who’s responsible? Who should resign? Less often is the ...
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly ...
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain ...
In The News
Sort By
- Date
- Title
Prioritise attacks, not alerts, with new Attack Discovery capability, powered by Search AI
Offers organisations 24/7 dark web monitoring to plug supply chain leaks
Developers warn that the current pace of innovation is not sustainable unless organisations equip IT teams with the tools they need. • Absence of the right tools to ...
Strengthens award-winning RevealXTM platform with new AI features to accelerate threat detection and response
SYDNEY – May 8, 2024 – In a significant milestone to help organisations get ahead of today’s cyber threats, Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud ...
Company unleashes power of Singularity™ Data Lake and Purple AI to transform security operations through new autonomous capabilities in the Singularity Platform.
Podcasts On Security Operations