Cisco's Talos threat intelligence unit has discovered a major IoT botnet that may be linked to a planned state-sponsored cyber attack on Ukraine.
The ATEN PSS PP v3.0 secure KVM switches provide isolation between computer sources and peripherals while sharing a single keyboard, mouse, monitor, speaker set and common access card (CAC) reader between connected computers of various security classifications.
A better approach to deploying security solutions is to match existing employee behaviours, rather than expecting people to change.
The OAIC has failed in its appeal to overturn an earlier verdict overruling its order for Telstra to provide metadata collected about subscribers.
Schneider Electric has launched an Industrial Cybersecurity Practice in Australia which, it said, aims to improve protection for utility, resources and manufacturing industries from attack.
For the increasingly hyper-connected energy sector, hacking one piece of industrial equipment can now be the same as attacking one million.
Gartner has urged organisations to update their network access policies and enforcement practices to address the growing number of IoT devices requiring access to the enterprise network.
LinkedIn has filed a lawsuit seeking to identify and obtain an injunction against unknown attackers who have been illegally scraping data from the enterprise social media platform since December.
IT security strategies are not complete unless they protect access to administrator credentials and improve domain controller security.
In the battle to protect sensitive data, organisations often overlook protection of their privileged SSH keys, thus leaving a gaping hole in their defences.
The current app store situation is a vector for malware to be accidentally loaded onto a user's device and then gain access to the corporate network.
Single sign-on (SSO) has long been the go-to technology to ensure convenient password synchronisation, replay and security. The move towards more web-based access methods, however, makes it difficult for yesterday's SSO solution to meet today's evolving application requirements.
The Australian Cyber Security Centre has produced a guide designed to help organisations protect against the compromise and abuse of privileged accounts.
The Fortinet FortiAP-S series access points (APs) provide organisations with a cost-effective, easy-to-manage and secure option for deploying secure Wi-Fi without compromising security when opting to manage their enterprise WLAN from the cloud.
The security perimeter has shifted from firewalls to identity management and now to content management, with the aim of preventing another Edward Snowden from succeeding.