Centre helps protect small business against cyber threats
07 June, 2022A new centre to help NSW small businesses respond to cybersecurity incidents has officially opened at Western Sydney University.
Scammers taking advantage of hype over NFTs
03 June, 2022 by Dylan Bushell-EmblingTenable has warned that scammers have started taking advantage of the hype over NFTs and cryptocurrencies to target their victims.
Perfect storm for security leaders
01 June, 2022 by Mark Troselj, Splunk Group Vice President for Australia and New Zealand | Supplied by: SplunkThe pressure to ward off attacks has reached a critical level over the past 12 months, with traditional attacks on the rise in addition to a host of other issues.
AgTech revolution leaving sector prone to cyber risks
30 May, 2022 by Dylan Bushell-EmblingGrowing adoption of AgTech technology could leave the agricultural sector at risk of cyber attacks such as side-channel attacks, researchers have warned.
Patching alone won't stop cybercrime
30 May, 2022 by Daniel Benad, group vice president and regional general manager, Oceania, Rimini Street | Supplied by: Rimini Street Australia Pty LimitedAssuming that periodic software patching is enough in the modern cybersecurity landscape ignores the fact that software companies are not security companies.
WhatsApp and QR codes are the next scam frontier
26 May, 2022 by Dylan Bushell-EmblingSecurity awareness training provider Knowbe4 has warned to expect a surge in threat activity involving WhatsApp and QR code abuse.
Observability leaders saving millions in downtime costs
25 May, 2022 by Dylan Bushell-EmblingThe most sophisticated cybersecurity observability leaders have been able to slash their downtime costs by an average of 90%, research suggests.
Monash researchers develop new code security tool
24 May, 2022 by Dylan Bushell-EmblingMonash University researchers have developed a new approach to predicting and mitigating software vulnerabilities at the source code level.
Securing backups: defending your defence
23 May, 2022 by Ryan Weeks, CISO, Datto | Supplied by: Datto IncTwo-pronged ransomware attacks are increasingly common, making MFA mandatory for activity that could potentially see backup data manipulated or deleted.
Security gaps leaving businesses wide open
17 May, 2022 by Pete Murray, Managing Director ANZ, Veritas Technologies | Supplied by: Veritas TechnologiesA new headache is coming to fruition for IT leaders in ensuring their security systems can keep pace in protecting each new technology infrastructure.
Phishing attacks surge 450% as attackers exploit SEO
16 May, 2022 by Dylan Bushell-EmblingPhishing attacks have surged 450% in the last year as attackers become increasingly adept at exploiting search engine optimisation in their campaigns.
New threats to data and critical infrastructure
13 May, 2022 by Garett Paton, Director Data Protection Solutions at Dell Technologies | Supplied by: Dell TechnologiesOrganisations are being forced to confront the evolving threat landscape and respond quickly to avoid data breaches, fraud and ransomware attacks.
White paper uncovers occupational fraud risk
13 May, 2022 | Supplied by: SAP Concur Technologies ( Australia) Pty LtdANZ organisations face an increased risk of occupational fraud due to the combined factors of the shift to remote work and sustained political and economic volatility, according to a new SAP Concur white paper.
Google, Apple, Microsoft commit to extending FIDO support
11 May, 2022 by Dylan Bushell-EmblingApple, Microsoft and Google have all committed to offering extended support to the FIDO Alliance's passwordless sign-in standards.
Why zero trust is no longer optional
11 May, 2022 by Ilan Rubin, Managing Director, Wavelink | Supplied by: WavelinkNetwork architectures that assume all users inside the perimeter are inherently trustworthy are no longer sufficient — it’s time to deploy zero trust.