Identifying blind spots: OT infrastructure vulnerability
13 July, 2022 by Dick Bussiere, Technical Director, APACAs OT intersects with external networks, the threat surface expands exponentially, creating infinitely more vulnerabilities and attack paths to be exploited.
Identity standards needed in the age of digital twins
07 July, 2022 by Nelson Petracek, CTOThe path to operating devices, processes and systems concurrently with digital twins is likely to be rough until approaches to digital identity become clearer.
Schneider, Claroty launch building security tool
22 June, 2022 by Dylan Bushell-EmblingSchneider Electric and Claroty have launched a joint solution providing a range of cyber-physical security capabilities for smart buildings.
Securing the future of work
08 June, 2022 by Lindsay Brown, VP and General Manager, APAC, GoToThe transition to hybrid or fully remote work has delivered new aspects in the security equation that must meet corporate standards and requirements.
AgTech revolution leaving sector prone to cyber risks
30 May, 2022 by Dylan Bushell-EmblingGrowing adoption of AgTech technology could leave the agricultural sector at risk of cyber attacks such as side-channel attacks, researchers have warned.
Best Practices for Applying the Essential Eight Framework to Java Security
30 May, 2022The Essential Eight is a maturity model designed to protect Microsoft Windows-based internet-connected networks, but may be applied to other operating systems as well.
Observability leaders saving millions in downtime costs
25 May, 2022 by Dylan Bushell-EmblingThe most sophisticated cybersecurity observability leaders have been able to slash their downtime costs by an average of 90%, research suggests.
New threats to data and critical infrastructure
13 May, 2022 by Garett Paton, Director Data Protection Solutions at Dell TechnologiesOrganisations are being forced to confront the evolving threat landscape and respond quickly to avoid data breaches, fraud and ransomware attacks.
Why zero trust is no longer optional
11 May, 2022 by Ilan Rubin, Managing Director, WavelinkNetwork architectures that assume all users inside the perimeter are inherently trustworthy are no longer sufficient — it’s time to deploy zero trust.
Australia facing huge spike in WAF attacks
29 April, 2022 by Dylan Bushell-EmblingAttackers are redoubling their efforts to disrupt the Australian market with web application firewall (WAF) multi-vector and DDoS attacks.
Australian security teams inundated with inaccurate alerts
23 March, 2022A new report says Australian IT teams are being inundated with inaccurate cloud security alerts.
Unmasking security concerns amid Australia's M&A boom
14 March, 2022 by David Arthur, Security Architect A/NZA rapid rise in M&A activity is set to continue, increasing security issues as no two organisations operate cloud environments the same way.
Darktrace secures extended airline contract
26 January, 2022 by Dylan Bushell-EmblingDarktrace has announced that a major airline will continue to use the company's cybersecurty AI technologies to safeguard against escalating cyber threats.
Merged McAfee Enterprise and FireEye rebrand as Trellix
25 January, 2022 by Dylan Bushell-EmblingThe combined company has taken the name Trellix to reflect its focus on providing a foundation for 'living security'.
Smart buildings targeted in cyber attacks
10 December, 2021 by Dylan Bushell-EmblingKNX National Group has provided smart building operators with a list of suggestions for securing the buildings against an intensifying wave of cyber attacks.