ISACA is urging Australian organisations to take steps to ensure compliance with the California Consumer Protection Act to avoid prosecution risk.
Research from Atlas VPN suggests that the number of data leaks surged to an all-time high in 1H20 even as the number of actual breaches declined year-on-year.
Organisations need to develop an identity access management strategy that offers access and security for everyone, while also remaining easy to use.
More than 70% of the vulnerabilities in the industrial control systems used by critical infrastructure operators can be exploited remotely, research suggests.
CyberCX has launched in NZ as part of plans to develop a trans-Tasman security company with the scale and capabilities needed to protect homegrown businesses.
A new industry support program has been launched to recruit small businesses to fight against cyber threats by developing ambitious capabilities for the ADF.
As the US govt tightens restrictions on exporting US tech to Huawei, the vendor is arguing that the actions against the company risk splintering the internet.
FireEye is inviting researchers to register to participate in the new public bug bounty program for its corporate infrastructure.
Research from NortonLifeLock has found that one in six Australians experienced cybercrime during the COVID-19 lockdown.
Barracuda Networks researchers have this year identified over 6170 email addresses from legitimate services that have been used in over 100,000 BEC attacks.
The Australian Computer Society has welcomed the 2020 Cyber Security Strategy, but the Australian Information Security Association is more lukewarm on it.
The federal government will introduce more powers for the AFP to fight cybercrime on the dark web as part of a raised $1.67bn cybersecurity funding commitment.
Reported data breaches grew 16% year-on-year in the six months ending in June as ransomware attacks took on a chilling new dimension.
Claroty said it has found and reported critical vulnerabilities in three popular VPN products used in industry to provide secure access to IoT devices.
Most security professionals lack the tools to detect known security threats and close known vulnerabilities, research from LogRhythm found.