Your IT must have: All-encompassing Digital Trust
01 August, 2022 by Diana Jovin, VP Product Marketing, DigiCertThe importance of digital trust extends beyond the handling of digital certificates; it is an integral part of the security and risk function, protecting companies from cybersecurity threats.
Is Australia finally coming to grips with cybersecurity?
26 July, 2022 by Jason Duerden, Regional Director ANZThe appointment of Australia's first dedicated minister for cybersecurity highlights a trend that dates back to the beginning of this decade.
Anatomy of a supply chain software attack
21 July, 2022 by Lawrence Crowther, Head of Solutions Engineering, SnykThreat actors are increasingly targeting the software supply chain because of the leverage available from a successful breach.
Identifying blind spots: OT infrastructure vulnerability
13 July, 2022 by Dick Bussiere, Technical Director, APACAs OT intersects with external networks, the threat surface expands exponentially, creating infinitely more vulnerabilities and attack paths to be exploited.
Identity standards needed in the age of digital twins
07 July, 2022 by Nelson Petracek, CTOThe path to operating devices, processes and systems concurrently with digital twins is likely to be rough until approaches to digital identity become clearer.
Schneider, Claroty launch building security tool
22 June, 2022 by Dylan Bushell-EmblingSchneider Electric and Claroty have launched a joint solution providing a range of cyber-physical security capabilities for smart buildings.
Securing the future of work
08 June, 2022 by Lindsay Brown, VP and General Manager, APAC, GoToThe transition to hybrid or fully remote work has delivered new aspects in the security equation that must meet corporate standards and requirements.
AgTech revolution leaving sector prone to cyber risks
30 May, 2022 by Dylan Bushell-EmblingGrowing adoption of AgTech technology could leave the agricultural sector at risk of cyber attacks such as side-channel attacks, researchers have warned.
Best Practices for Applying the Essential Eight Framework to Java Security
30 May, 2022The Essential Eight is a maturity model designed to protect Microsoft Windows-based internet-connected networks, but may be applied to other operating systems as well.
Observability leaders saving millions in downtime costs
25 May, 2022 by Dylan Bushell-EmblingThe most sophisticated cybersecurity observability leaders have been able to slash their downtime costs by an average of 90%, research suggests.
New threats to data and critical infrastructure
13 May, 2022 by Garett Paton, Director Data Protection Solutions at Dell TechnologiesOrganisations are being forced to confront the evolving threat landscape and respond quickly to avoid data breaches, fraud and ransomware attacks.
Why zero trust is no longer optional
11 May, 2022 by Ilan Rubin, Managing Director, WavelinkNetwork architectures that assume all users inside the perimeter are inherently trustworthy are no longer sufficient — it’s time to deploy zero trust.
Australia facing huge spike in WAF attacks
29 April, 2022 by Dylan Bushell-EmblingAttackers are redoubling their efforts to disrupt the Australian market with web application firewall (WAF) multi-vector and DDoS attacks.
Australian security teams inundated with inaccurate alerts
23 March, 2022A new report says Australian IT teams are being inundated with inaccurate cloud security alerts.
Unmasking security concerns amid Australia's M&A boom
14 March, 2022 by David Arthur, Security Architect A/NZA rapid rise in M&A activity is set to continue, increasing security issues as no two organisations operate cloud environments the same way.