Security > Network security

Aussie orgs still struggling to identify cyber risk

09 August, 2022

New research from Trend Micro has revealed that 48% of Australian organisations feel their cyber risk assessments are not sophisticated enough.


Vulnerability management is more than patching

08 August, 2022 by Nathan Wenzler, Chief Security Officer, Tenable APAC

Organisations of every size across every industry have had to evolve their security practices to align better with how they conduct their operations.


Your IT must have: All-encompassing Digital Trust

01 August, 2022 by Diana Jovin, VP Product Marketing, DigiCert

The importance of digital trust extends beyond the handling of digital certificates; it is an integral part of the security and risk function, protecting companies from cybersecurity threats.


Is Australia finally coming to grips with cybersecurity?

26 July, 2022 by Jason Duerden, Regional Director ANZ

The appointment of Australia's first dedicated minister for cybersecurity highlights a trend that dates back to the beginning of this decade.


Anatomy of a supply chain software attack

21 July, 2022 by Lawrence Crowther, Head of Solutions Engineering, Snyk

Threat actors are increasingly targeting the software supply chain because of the leverage available from a successful breach.


Identifying blind spots: OT infrastructure vulnerability

13 July, 2022 by Dick Bussiere, Technical Director, APAC

As OT intersects with external networks, the threat surface expands exponentially, creating infinitely more vulnerabilities and attack paths to be exploited.


Identity standards needed in the age of digital twins

07 July, 2022 by Nelson Petracek, CTO

The path to operating devices, processes and systems concurrently with digital twins is likely to be rough until approaches to digital identity become clearer.


Schneider, Claroty launch building security tool

22 June, 2022 by Dylan Bushell-Embling

Schneider Electric and Claroty have launched a joint solution providing a range of cyber-physical security capabilities for smart buildings.


Securing the future of work

08 June, 2022 by Lindsay Brown, VP and General Manager, APAC, GoTo

The transition to hybrid or fully remote work has delivered new aspects in the security equation that must meet corporate standards and requirements.


AgTech revolution leaving sector prone to cyber risks

30 May, 2022 by Dylan Bushell-Embling

Growing adoption of AgTech technology could leave the agricultural sector at risk of cyber attacks such as side-channel attacks, researchers have warned.


Best Practices for Applying the Essential Eight Framework to Java Security

30 May, 2022

The Essential Eight is a maturity model designed to protect Microsoft Windows-based internet-connected networks, but may be applied to other operating systems as well.


Observability leaders saving millions in downtime costs

25 May, 2022 by Dylan Bushell-Embling

The most sophisticated cybersecurity observability leaders have been able to slash their downtime costs by an average of 90%, research suggests.


New threats to data and critical infrastructure

13 May, 2022 by Garett Paton, Director Data Protection Solutions at Dell Technologies

Organisations are being forced to confront the evolving threat landscape and respond quickly to avoid data breaches, fraud and ransomware attacks.


Why zero trust is no longer optional

11 May, 2022 by Ilan Rubin, Managing Director, Wavelink

Network architectures that assume all users inside the perimeter are inherently trustworthy are no longer sufficient — it’s time to deploy zero trust.


Australia facing huge spike in WAF attacks

29 April, 2022 by Dylan Bushell-Embling

Attackers are redoubling their efforts to disrupt the Australian market with web application firewall (WAF) multi-vector and DDoS attacks.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd