Security

Scattered Spider: where every click is one step closer to chaos

20 September, 2024 by Chris Fisher* | Supplied by: Vectra AI

Cybercriminal group Scattered Spider often uses social engineering to gain access to identities and is slick at bypassing multifactor authentication.


Accurate Background launches Accel platform

20 September, 2024 by Dylan Bushell-Embling

Employee screening provider Accurate Background has unveiled a fully Australian-built and -hosted background check platform for enterprise and government.


Absolute Security buys UEM experts Syxsense

09 September, 2024 by Dylan Bushell-Embling | Supplied by: Absolute Software

Absolute Security has acquired endpoint and vulnerability management company Syxsense to enable it to expand into potentially lucrative adjacent markets.


Tenable upgrades Nessus risk assessment platform

06 September, 2024 by Dylan Bushell-Embling | Supplied by: Tenable APAC

Tenable has introduced new capabilities to its Nessus vulnerability assessment platform aimed at helping customers better identify and prioritise risks.


Rubrik teams with Cisco to enhance data security

02 September, 2024 by Dylan Bushell-Embling | Supplied by: Rubrik Australia Pty Ltd

Rubrik has arranged to have all its products made available through the Cisco SolutionsPlus partner program.


The MediSecure breach thrusts the security spotlight back on service providers

27 August, 2024 by Scott Hesford, Director of Solutions Engineering Asia Pacific and Japan, BeyondTrust* | Supplied by: BeyondTrust

Organisations have been confronting security risks in their supply chains for years, but a new wave of attacks is encouraging threat actors to redouble their focus.


Cloudera certified for compliance with PCI DSS 4.0

23 August, 2024 by Dylan Bushell-Embling | Supplied by: Cloudera Inc

Cloudera has secured certification for Level 1 compliance with version 4.0 of the Payment Card Industry Data Security Standard.


Managing third-party cybersecurity risks in the supply chain

21 August, 2024 by Mark Jones, Senior Partner, Tesserent | Supplied by: Tesserent Australia Pty Ltd

Third-party cybersecurity breaches occur when the victim's defences are compromised through a partner or service provider.


Rubrik launches Salesforce Data Protection

20 August, 2024 by Dylan Bushell-Embling | Supplied by: Rubrik Australia Pty Ltd

Data security company Rubrik’s new Salesforce Data Protection offering aims to help Salesforce users mitigate the risk of financial operation downtime.


DigiCert announces speaker line-up for quantum summit

16 August, 2024 by Dylan Bushell-Embling | Supplied by: DigiCert

DigiCert has named the quantum computing and cryptography experts who will be speaking at the company's World Quantum Readiness Day event next month.


Countering MFA fatigue demands a rethink on user authentication

12 August, 2024 by Kurt Hansen, CEO, Tesserent | Supplied by: Tesserent Australia Pty Ltd

While MFA remains effective, highly motivated threat actors are using tactics that seek to overcome this important security tool.


Half of Australian ransomware victims paid up: survey

09 August, 2024 by Dylan Bushell-Embling | Supplied by: Cloudflare

A survey from Cloudflare indicates that 50% of the Australian companies falling victim to ransomware in the last two years paid off their attackers.


HPE expands AI network security capabilities

09 August, 2024 by Dylan Bushell-Embling | Supplied by: Hewlett Packard Enterprise

HPE has introduced behavioural analytics-based network detection and response capabilities to help safeguard against IoT-related threats.


Security execs overstate supply chain security: JFrog

05 August, 2024 by Dylan Bushell-Embling

A new report from DevOps company JFrog found that security executives are underestimating their organisations' exposure to software supply chain risks.


Four common zero-trust misconceptions derailing cybersecurity success

26 July, 2024 by John Kindervag* | Supplied by: Illumio

John Kindervag, creator of the zero-trust concept, explores the four most common zero-trust misconceptions.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd