Security

ISACA identifies gaps in AI knowledge, training and policies

09 May, 2024 | Supplied by: ISACA

85% of digital trust professionals say they will need to increase their AI skills and knowledge within two years to advance or retain their jobs.


Emergency onboarding: what to do before and after a data breach

09 May, 2024 by James Richmond, Regional Director ANZ, Akamai Technologies | Supplied by: Akamai Technologies

Organisations that have an emergency onboarding plan are better positioned to have their business back up and running quickly in the event of a data breach.


Savvy directors are demanding more points of proof when cyber incidents occur

08 May, 2024 by Scott Mann, Incident Response Team Lead – APAC, Check Point Software Technologies | Supplied by: Check Point Software Technologies Ltd

Pre-agreement on what a post-incident forensics effort should produce — and testing it out before use — is now 'table stakes' for incident response.


VNC accounts for nearly all remote desktop attacks

08 May, 2024 by Dylan Bushell-Embling | Supplied by: Barracuda Networks

Virtual Network Computing accounted for 98% of remote desktop attacks recorded by Barracuda last year.


Vectra AI expands platform to combat GenAI threats

07 May, 2024 by Dylan Bushell-Embling | Supplied by: Vectra AI

Vectra AI has announced new enhancements to its AI-driven platform aimed at protecting businesses from threats introduced with the adoption of generative AI.


Cyber-attack prevention is better than a cure

06 May, 2024 by Nic Nuske, CEO, VeroGuard Systems,cyber-attack prevention | Supplied by: VeroGuard Systems

Corporate and political decision-makers need to invest in areas that do a better job of protecting Australians online and our future economic prosperity.


Australian ransomware payments average at $9.27 million

03 May, 2024 by Dylan Bushell-Embling | Supplied by: Sophos Pty Ltd

Data from Sophos suggests that Australian businesses falling victim to a ransomware attack coughed up an average of nearly $10 million in 2023.


Akamai launches zero trust platform

03 May, 2024 by Dylan Bushell-Embling | Supplied by: Akamai Technologies

Akamai's new Guardicore platform combined Zero Trust Network Access with microsgmentation to stop attacks in their tracks.


The problem with passwords is not what you think

01 May, 2024 by Matt Caffrey, Senior Solutions Architect, Barracuda Networks | Supplied by: Barracuda Networks

When it comes to secure authentication, there seems to be a lesson we're not learning.


Veeam buys ransomware response company Coveware

26 April, 2024 by Dylan Bushell-Embling | Supplied by: Veeam Pty Ltd

Veeam has arranged to augment its cyber extortion incident response capabilities with the acquisition of Coveware.


Commvault arranges to buy Appranix

22 April, 2024 by Dylan Bushell-Embling | Supplied by: CommVault Systems Inc

Cyber resilience provider Commvault plans to leverage its acquisition of Appranix to help customers more rapidly recover from a successful ransomware attack.


Fujitsu establishes security consulting division

17 April, 2024 by Dylan Bushell-Embling | Supplied by: Fujitsu Australia

Fujitsu's new digital security consulting division will help organisations prepare for and respond to complex cyber threats.


Secure-by-design software development for digital innovation

16 April, 2024 by Craig Nielsen* | Supplied by: GitLab

The rise of DevSecOps methodologies and developments in AI offers every business the opportunity to create and maintain a new gold standard.


Bolstering AI-powered cybersecurity in the face of increasing threats

15 April, 2024 by Chris Fisher* | Supplied by: Vectra AI

The escalation of complex cyber risks is becoming a pressing issue for those in business leadership roles.


How attackers are weaponising GenAI through data poisoning and manipulation

08 April, 2024 by Gabriel Moss, software engineer, Advanced Technology Group, Barracuda Networks Inc | Supplied by: Barracuda Networks

The possibility for shared large language models to be manipulated through data poisoning increases the possibility that models could collapse in on themselves.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd