Security

New CISOs: how to achieve success in your first 100 days

13 August, 2021

Gartner has developed a roadmap, comprising five phases over 100 days, to help CISOs succeed in their new role.


Companies urged to consider pros and cons of paying a ransom

10 August, 2021 by Dustin Brewer*, Senior Director of Emerging Technology and Innovation at ISACA | Supplied by: ISACA

The conversation is heating up globally about whether companies should pay in a ransomware attack.


ACSC warns of steep rise in LockBit ransomware attacks

09 August, 2021 by Dylan Bushell-Embling

The ACSC has issued a threat advisory warning of a sharp increase in the volume of successful LockBit ransomware attacks targeting Australian organisations.


Any DNS provider could be vulnerable to new attack

09 August, 2021 by Dylan Bushell-Embling

Wiz.io has uncovered a new class of DNS vulnerabilities that could potentially affect any DNS-as-a-service provider and their customers.


OAIC launches investigation into Optus

09 August, 2021

The Office of the Australian Information Commissioner (OAIC) has launched an investigation into Optus for potential privacy violations.


69% of Australian orgs expect a data breach this year

06 August, 2021 by Dylan Bushell-Embling

Nearly seven in 10 Australian organisations expect their customer information to be impacted in a data breach in the next 12 months, according to Trend Micro


RSM, X-Analytics to help orgs manage financial cyber risk exposure

06 August, 2021

RSM Australia has partnered with X-Analytics to assess the cyber risk an organisation carries in clear monetary terms.


Darktrace expands Aussie presence following 60% YoY growth

04 August, 2021

AI cybersecurity firm Darktrace has announced its expansion in Australia, as more organisations adopt an AI-driven approach to cyber defence.


ACSC, allies list top 30 routinely exploited vulnerabilities

30 July, 2021

The ACSC and allies have released a joint cybersecurity advisory, highlighting the top CVEs routinely exploited by cyber actors.


Claroty finds critical vulnerabilities in cloud-based ICS platforms

30 July, 2021

Industrial cybersecurity company Claroty’s research arm, Team82 has found critical vulnerabilities in cloud-based management platforms for industrial control systems (ICS).


311 days — the average time to detect and contain a data breach

29 July, 2021

The average time to detect and contain a data breach in Australia was 311 days, according to IBM Security's latest report.


Uber interfered with privacy of 1.2 million Australians

26 July, 2021

The Office of Australian Information Commissioner (OAIC) has determined that Uber interfered with the privacy of around 1.2 million Australians.


Phishing attacks: staff shortages leading to longer remediation times

23 July, 2021

More than half of IT professionals say under-resourcing is leading to longer phishing incident remediation times. 


MosaicLoader malware targets software pirates

22 July, 2021 by Dylan Bushell-Embling

Bitdefender has uncovered a new malware campaign that uses a variety of methods to confuse security researchers and prevent reverse engineering.


Cyber attacks of the future: weaponising OT environments to kill

22 July, 2021

Gartner predicts that by 2025 cyber attackers will have weaponised operational technology (OT) environments to harm or kill humans.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd