CSO Group and xAmplify announce merger
27 June, 2024CSO Group and xAmplify will merge to create what they say will be Australia's largest home-grown cybersecurity and AI consulting group.
Study finds five markers of cyber maturity
26 June, 2024 by Dylan Bushell-Embling | Supplied by: CommVault Systems IncA survey commissioned by Commvault has identified five key capabilities commonly shared by companies able to recover faster from cyber attacks.
Beware of EOFY scams and breaches: how Aussie businesses can stay safe
26 June, 2024 by Reuben Koh, Director, Security Technology & Strategy APJ, Akamai | Supplied by: Akamai TechnologiesWith the end of financial year approaching, we can anticipate seeing an increase in financial scams.
Proofpoint uncovers social engineering technique
24 June, 2024 by Dylan Bushell-Embling | Supplied by: Proofpoint Inc.Proofpoint has observed threat actors using a social engineering technique involving tricking Chrome users into running malicious PowerShell scripts.
Getting the balance right between business innovation, security and AI
21 June, 2024 by Chris Fisher* | Supplied by: Vectra AIAs businesses continue to digitise their operations, traditional security measures may no longer suffice.
Lack of leadership buy-in biggest obstacle to digital trust: report
13 June, 2024 | Supplied by: ISACAA new report from ISACA says that many organisations say that in five years digital trust will be more important, yet only 20% are increasing budgets for it.
If you want to fix cyber, stop trying to fix people
06 June, 2024 by Neal Costello*We need to stop trying to fix people and start understanding and supporting them with the right technology, intelligently implemented.
Managing through uncertainty requires facing security unknowns head on
31 May, 2024 by Robin Long, Field CTO, Asia Pacific, Rapid7 | Supplied by: Rapid7Understanding the attack surface in its entirety is not just a tactical advantage; it is a strategic imperative.
Lack of customer confidence affecting security strategies: report
31 May, 2024 | Supplied by: LogRhythm IncA survey from LogRhythm finds three-quarters of ANZ companies changed their security strategy having lost deals due to customers' lack of confidence.
Why the success of modern cyber defence hinges on identity security
22 May, 2024 by Scott Hesford, Director of Solutions Engineering Asia Pacific and Japan, BeyondTrust | Supplied by: BeyondTrustA single compromised identity could easily provide the keys to the kingdom if it isn't properly secured.
IMT sector was Australia's most targeted in 2023: report
17 May, 2024 by Dylan Bushell-EmblingThe information, media and technology sector has been the Australian industry most targeted by threat actors in 2023 in a report from Ensign InfoSecurity.
Emergency onboarding: what to do before and after a data breach
09 May, 2024 by James Richmond, Regional Director ANZ, Akamai Technologies | Supplied by: Akamai TechnologiesOrganisations that have an emergency onboarding plan are better positioned to have their business back up and running quickly in the event of a data breach.
ISACA identifies gaps in AI knowledge, training and policies
09 May, 2024 | Supplied by: ISACA85% of digital trust professionals say they will need to increase their AI skills and knowledge within two years to advance or retain their jobs.
VNC accounts for nearly all remote desktop attacks
08 May, 2024 by Dylan Bushell-Embling | Supplied by: Barracuda NetworksVirtual Network Computing accounted for 98% of remote desktop attacks recorded by Barracuda last year.
Savvy directors are demanding more points of proof when cyber incidents occur
08 May, 2024 by Scott Mann, Incident Response Team Lead – APAC, Check Point Software Technologies | Supplied by: Check Point Software Technologies LtdPre-agreement on what a post-incident forensics effort should produce — and testing it out before use — is now 'table stakes' for incident response.