Companies rethinking security strategies for hybrid
11 August, 2022Organisations are increasing investments in technologies that allow them to provide a simpler, more consistent and secure experience for employees.
Aussie orgs still struggling to identify cyber risk
09 August, 2022New research from Trend Micro has revealed that 48% of Australian organisations feel their cyber risk assessments are not sophisticated enough.
Vulnerability management is more than patching
08 August, 2022 by Nathan Wenzler, Chief Security Officer, Tenable APACOrganisations of every size across every industry have had to evolve their security practices to align better with how they conduct their operations.
Your IT must have: All-encompassing Digital Trust
01 August, 2022 by Diana Jovin, VP Product Marketing, DigiCertThe importance of digital trust extends beyond the handling of digital certificates; it is an integral part of the security and risk function, protecting companies from cybersecurity threats.
Is Australia finally coming to grips with cybersecurity?
26 July, 2022 by Jason Duerden, Regional Director ANZThe appointment of Australia's first dedicated minister for cybersecurity highlights a trend that dates back to the beginning of this decade.
Anatomy of a supply chain software attack
21 July, 2022 by Lawrence Crowther, Head of Solutions Engineering, SnykThreat actors are increasingly targeting the software supply chain because of the leverage available from a successful breach.
Identifying blind spots: OT infrastructure vulnerability
13 July, 2022 by Dick Bussiere, Technical Director, APACAs OT intersects with external networks, the threat surface expands exponentially, creating infinitely more vulnerabilities and attack paths to be exploited.
Identity standards needed in the age of digital twins
07 July, 2022 by Nelson Petracek, CTOThe path to operating devices, processes and systems concurrently with digital twins is likely to be rough until approaches to digital identity become clearer.
Schneider, Claroty launch building security tool
22 June, 2022 by Dylan Bushell-EmblingSchneider Electric and Claroty have launched a joint solution providing a range of cyber-physical security capabilities for smart buildings.
Securing the future of work
08 June, 2022 by Lindsay Brown, VP and General Manager, APAC, GoToThe transition to hybrid or fully remote work has delivered new aspects in the security equation that must meet corporate standards and requirements.
AgTech revolution leaving sector prone to cyber risks
30 May, 2022 by Dylan Bushell-EmblingGrowing adoption of AgTech technology could leave the agricultural sector at risk of cyber attacks such as side-channel attacks, researchers have warned.
Best Practices for Applying the Essential Eight Framework to Java Security
30 May, 2022The Essential Eight is a maturity model designed to protect Microsoft Windows-based internet-connected networks, but may be applied to other operating systems as well.
Observability leaders saving millions in downtime costs
25 May, 2022 by Dylan Bushell-EmblingThe most sophisticated cybersecurity observability leaders have been able to slash their downtime costs by an average of 90%, research suggests.
New threats to data and critical infrastructure
13 May, 2022 by Garett Paton, Director Data Protection Solutions at Dell TechnologiesOrganisations are being forced to confront the evolving threat landscape and respond quickly to avoid data breaches, fraud and ransomware attacks.
Why zero trust is no longer optional
11 May, 2022 by Ilan Rubin, Managing Director, WavelinkNetwork architectures that assume all users inside the perimeter are inherently trustworthy are no longer sufficient — it’s time to deploy zero trust.