As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches and attacks. Among the most prevalent forms of cybercrime, phishing has seen a staggering 472% surge in attacks in the past year alone.
The ThreatLabz 2023 Phishing Report reiterates that organisations need to be more vigilant than ever when it comes to protecting themselves and their customers from phishing scams, as phishing attacks rose nearly 50% in ...
The Voice of Cyber®
Zero Trust
Zero Trust is a cybersecurity framework that challenges the traditional perimeter-based security model by assuming that threats can originate from both external and internal sources. In a Zero Trust model, trust is never assumed, and strict access controls are implemented regardless of the user’s location, network, or device. The core principle of Zero Trust is to verify and authenticate every user, device, or application trying to access a network, even if they are already inside the organization’s perimeter.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Jason du Preez, Vice President of Privacy and Security at Informatica, comments on why the companies that collect our data have the power and the responsibility to take ...
We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing ...
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?
BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI ...
The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there.
CyberArk Introduces Peer-Based Framework for Evaluating and Maturing Identity Security Strategies
In The News
Sort By
- Date
- Title
Kyndryl, the world’s largest IT infrastructure services provider, today announced a global strategic alliance and new Kyndryl services with Rubrik the Zero Trust Data ...
Prisma SASE 3.0 extends Zero Trust to unmanaged devices, secures data with AI, and boosts application performance for partners and customers
The Check Point Infinity Platform is recognised as the leading solution for Zero Trust security, offering Exceptional user experience and security efficacy
Fortinet® (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, has announced a new compact, ruggedised appliance explicitly ...
Extreme Networks has announced two new solutions designed to help highly distributed enterprise organisations create improved network connectivity, security and application ...
ExtraHop customers can now store records in LogScale, enabling greater flexibility and streamlining network data analysis
Podcasts On Zero Trust