Tesserent has acquired cybersecurity firm Loop Secure to bolster the capabilities of its Cyber 360 security platform.
Tesserent has appointed Hamish Soper to lead its expansion in New Zealand, following its acquisition of Lateral Security.
Australian Consumer Data Right vendor Biza.io has urged the government to ensure new participants in the scheme are subject to stringent security requirements.
Gartner has developed a roadmap, comprising five phases over 100 days, to help CISOs succeed in their new role.
Wiz.io has uncovered a new class of DNS vulnerabilities that could potentially affect any DNS-as-a-service provider and their customers.
AI cybersecurity firm Darktrace has announced its expansion in Australia, as more organisations adopt an AI-driven approach to cyber defence.
Industrial cybersecurity company Claroty’s research arm, Team82 has found critical vulnerabilities in cloud-based management platforms for industrial control systems (ICS).
The ACSC and allies have released a joint cybersecurity advisory, highlighting the top CVEs routinely exploited by cyber actors.
Zero Trust, a strategic initiative designed to stop data breaches, has come of age in the last 12 months due to the heightened cybersecurity risks faced by organisations.
Research into the attack surfaces of 1500 major companies found that the average corporate network is full of dozens of common vulnerabilities and exposures.
The Attorney-General's Department will recommend that the ACSC's Essential Eight threat mitigation strategies be made mandatory for non-corporate govt entities.
Enhancing AI-driven solutions with machine learning and augmented intelligence could help CISOs create a stronger cybersecurity ecosystem for their organisation.
The secure KVM Switches from ATEN with NIAP PSS PP v3.0 compliance are designed to secure the desktop while providing a user-friendly experience.
IT security teams are experiencing stress at work and at home due to the high volume of security alerts they must deal with throughout the day, research shows.
According to the agencies, DarkSide threat actors primarily use the Onion Router for command and control, and have also been observed using Cobalt Strike for the same purpose.