Too much of a good thing: Australia's cyber overlap issue
12 July, 2024 by Tim Hartman*Recent research indicates many organisations may have too many security systems with overlapping functions in place.
Cysurance to offer cyber insurance to Sophos customers
11 July, 2024 by Dylan Bushell-Embling | Supplied by: Sophos Pty LtdAustralian Sophos customers will be able to take advantage of discounted cyber insurance provided by Cysurance under a new partnership between the companies.
The true cost of cyber attacks
11 July, 2024 by Matt Caffrey, Senior Solutions Architect, Barracuda Networks | Supplied by: Barracuda NetworksThe average annual expense of recovering and dealing with cyber attacks has surpassed AU$4.1 million.
Boomi launches API management platform
10 July, 2024 by Dylan Bushell-Embling | Supplied by: BoomiBoomi's new API Control Plane can help organisations get on top of the security and inefficiency risks posed by shadow APIs.
Tackling the human element in modern authentication: the phishing-resistant user
10 July, 2024 by Geoff Schomburgk* | Supplied by: Yubico IncIntegrating human-centric cybersecurity strategies is not merely an option but a necessity in today's threat landscape.
66% of Aust organisations plan to use GenAI to enhance security: study
09 July, 2024 | Supplied by: Tenable APACA study by Tenable shows companies plan to use GenAI to enhance security measures and align IT objectives, but only 11% exhibit high confidence in implementation.
CSO Group and xAmplify announce merger
27 June, 2024CSO Group and xAmplify will merge to create what they say will be Australia's largest home-grown cybersecurity and AI consulting group.
Beware of EOFY scams and breaches: how Aussie businesses can stay safe
26 June, 2024 by Reuben Koh, Director, Security Technology & Strategy APJ, Akamai | Supplied by: Akamai TechnologiesWith the end of financial year approaching, we can anticipate seeing an increase in financial scams.
Study finds five markers of cyber maturity
26 June, 2024 by Dylan Bushell-Embling | Supplied by: CommVault Systems IncA survey commissioned by Commvault has identified five key capabilities commonly shared by companies able to recover faster from cyber attacks.
Proofpoint uncovers social engineering technique
24 June, 2024 by Dylan Bushell-Embling | Supplied by: Proofpoint Inc.Proofpoint has observed threat actors using a social engineering technique involving tricking Chrome users into running malicious PowerShell scripts.
Getting the balance right between business innovation, security and AI
21 June, 2024 by Chris Fisher* | Supplied by: Vectra AIAs businesses continue to digitise their operations, traditional security measures may no longer suffice.
Lack of leadership buy-in biggest obstacle to digital trust: report
13 June, 2024 | Supplied by: ISACAA new report from ISACA says that many organisations say that in five years digital trust will be more important, yet only 20% are increasing budgets for it.
If you want to fix cyber, stop trying to fix people
06 June, 2024 by Neal Costello*We need to stop trying to fix people and start understanding and supporting them with the right technology, intelligently implemented.
Lack of customer confidence affecting security strategies: report
31 May, 2024 | Supplied by: LogRhythm IncA survey from LogRhythm finds three-quarters of ANZ companies changed their security strategy having lost deals due to customers' lack of confidence.
Managing through uncertainty requires facing security unknowns head on
31 May, 2024 by Robin Long, Field CTO, Asia Pacific, Rapid7 | Supplied by: Rapid7Understanding the attack surface in its entirety is not just a tactical advantage; it is a strategic imperative.