Perfect storm for security leaders
01 June, 2022 by Mark Troselj, Splunk Group Vice President for Australia and New Zealand | Supplied by: SplunkThe pressure to ward off attacks has reached a critical level over the past 12 months, with traditional attacks on the rise in addition to a host of other issues.
Patching alone won't stop cybercrime
30 May, 2022 by Daniel Benad, group vice president and regional general manager, Oceania, Rimini Street | Supplied by: Rimini Street Australia Pty LimitedAssuming that periodic software patching is enough in the modern cybersecurity landscape ignores the fact that software companies are not security companies.
AgTech revolution leaving sector prone to cyber risks
30 May, 2022 by Dylan Bushell-EmblingGrowing adoption of AgTech technology could leave the agricultural sector at risk of cyber attacks such as side-channel attacks, researchers have warned.
WhatsApp and QR codes are the next scam frontier
26 May, 2022 by Dylan Bushell-EmblingSecurity awareness training provider Knowbe4 has warned to expect a surge in threat activity involving WhatsApp and QR code abuse.
Observability leaders saving millions in downtime costs
25 May, 2022 by Dylan Bushell-EmblingThe most sophisticated cybersecurity observability leaders have been able to slash their downtime costs by an average of 90%, research suggests.
Monash researchers develop new code security tool
24 May, 2022 by Dylan Bushell-EmblingMonash University researchers have developed a new approach to predicting and mitigating software vulnerabilities at the source code level.
Securing backups: defending your defence
23 May, 2022 by Ryan Weeks, CISO, Datto | Supplied by: Datto IncTwo-pronged ransomware attacks are increasingly common, making MFA mandatory for activity that could potentially see backup data manipulated or deleted.
Security gaps leaving businesses wide open
17 May, 2022 by Pete Murray, Managing Director ANZ, Veritas Technologies | Supplied by: Veritas TechnologiesA new headache is coming to fruition for IT leaders in ensuring their security systems can keep pace in protecting each new technology infrastructure.
Phishing attacks surge 450% as attackers exploit SEO
16 May, 2022 by Dylan Bushell-EmblingPhishing attacks have surged 450% in the last year as attackers become increasingly adept at exploiting search engine optimisation in their campaigns.
New threats to data and critical infrastructure
13 May, 2022 by Garett Paton, Director Data Protection Solutions at Dell Technologies | Supplied by: Dell TechnologiesOrganisations are being forced to confront the evolving threat landscape and respond quickly to avoid data breaches, fraud and ransomware attacks.
White paper uncovers occupational fraud risk
13 May, 2022 | Supplied by: SAP Concur Technologies ( Australia) Pty LtdANZ organisations face an increased risk of occupational fraud due to the combined factors of the shift to remote work and sustained political and economic volatility, according to a new SAP Concur white paper.
Why zero trust is no longer optional
11 May, 2022 by Ilan Rubin, Managing Director, Wavelink | Supplied by: WavelinkNetwork architectures that assume all users inside the perimeter are inherently trustworthy are no longer sufficient — it’s time to deploy zero trust.
Google, Apple, Microsoft commit to extending FIDO support
11 May, 2022 by Dylan Bushell-EmblingApple, Microsoft and Google have all committed to offering extended support to the FIDO Alliance's passwordless sign-in standards.
Outdated security no match for modern threats
06 May, 2022A new report from Vectra highlights how organisations are continuing to fail by tackling complex, modern cyber threats using outdated methods.
Australia facing huge spike in WAF attacks
29 April, 2022 by Dylan Bushell-EmblingAttackers are redoubling their efforts to disrupt the Australian market with web application firewall (WAF) multi-vector and DDoS attacks.