Security

Perfect storm for security leaders

01 June, 2022 by Mark Troselj, Splunk Group Vice President for Australia and New Zealand | Supplied by: Splunk

The pressure to ward off attacks has reached a critical level over the past 12 months, with traditional attacks on the rise in addition to a host of other issues.


Patching alone won't stop cybercrime

30 May, 2022 by Daniel Benad, group vice president and regional general manager, Oceania, Rimini Street | Supplied by: Rimini Street Australia Pty Limited

Assuming that periodic software patching is enough in the modern cybersecurity landscape ignores the fact that software companies are not security companies.


AgTech revolution leaving sector prone to cyber risks

30 May, 2022 by Dylan Bushell-Embling

Growing adoption of AgTech technology could leave the agricultural sector at risk of cyber attacks such as side-channel attacks, researchers have warned.


WhatsApp and QR codes are the next scam frontier

26 May, 2022 by Dylan Bushell-Embling

Security awareness training provider Knowbe4 has warned to expect a surge in threat activity involving WhatsApp and QR code abuse.


Observability leaders saving millions in downtime costs

25 May, 2022 by Dylan Bushell-Embling

The most sophisticated cybersecurity observability leaders have been able to slash their downtime costs by an average of 90%, research suggests.


Monash researchers develop new code security tool

24 May, 2022 by Dylan Bushell-Embling

Monash University researchers have developed a new approach to predicting and mitigating software vulnerabilities at the source code level.


Securing backups: defending your defence

23 May, 2022 by Ryan Weeks, CISO, Datto | Supplied by: Datto Inc

Two-pronged ransomware attacks are increasingly common, making MFA mandatory for activity that could potentially see backup data manipulated or deleted.


Security gaps leaving businesses wide open

17 May, 2022 by Pete Murray, Managing Director ANZ, Veritas Technologies | Supplied by: Veritas Technologies

A new headache is coming to fruition for IT leaders in ensuring their security systems can keep pace in protecting each new technology infrastructure.


Phishing attacks surge 450% as attackers exploit SEO

16 May, 2022 by Dylan Bushell-Embling

Phishing attacks have surged 450% in the last year as attackers become increasingly adept at exploiting search engine optimisation in their campaigns.


White paper uncovers occupational fraud risk

13 May, 2022 | Supplied by: SAP Concur Technologies ( Australia) Pty Ltd

ANZ organisations face an increased risk of occupational fraud due to the combined factors of the shift to remote work and sustained political and economic volatility, according to a new SAP Concur white paper.


New threats to data and critical infrastructure

13 May, 2022 by Garett Paton, Director Data Protection Solutions at Dell Technologies | Supplied by: Dell Technologies

Organisations are being forced to confront the evolving threat landscape and respond quickly to avoid data breaches, fraud and ransomware attacks.


Why zero trust is no longer optional

11 May, 2022 by Ilan Rubin, Managing Director, Wavelink | Supplied by: Wavelink

Network architectures that assume all users inside the perimeter are inherently trustworthy are no longer sufficient — it’s time to deploy zero trust.


Google, Apple, Microsoft commit to extending FIDO support

11 May, 2022 by Dylan Bushell-Embling

Apple, Microsoft and Google have all committed to offering extended support to the FIDO Alliance's passwordless sign-in standards.


Outdated security no match for modern threats

06 May, 2022

A new report from Vectra highlights how organisations are continuing to fail by tackling complex, modern cyber threats using outdated methods.


Australia facing huge spike in WAF attacks

29 April, 2022 by Dylan Bushell-Embling

Attackers are redoubling their efforts to disrupt the Australian market with web application firewall (WAF) multi-vector and DDoS attacks.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd