Proofpoint uncovers social engineering technique
24 June, 2024 by Dylan Bushell-Embling | Supplied by: Proofpoint Inc.Proofpoint has observed threat actors using a social engineering technique involving tricking Chrome users into running malicious PowerShell scripts.
Getting the balance right between business innovation, security and AI
21 June, 2024 by Chris Fisher* | Supplied by: Vectra AIAs businesses continue to digitise their operations, traditional security measures may no longer suffice.
Lack of leadership buy-in biggest obstacle to digital trust: report
13 June, 2024 | Supplied by: ISACAA new report from ISACA says that many organisations say that in five years digital trust will be more important, yet only 20% are increasing budgets for it.
If you want to fix cyber, stop trying to fix people
06 June, 2024 by Neal Costello*We need to stop trying to fix people and start understanding and supporting them with the right technology, intelligently implemented.
Managing through uncertainty requires facing security unknowns head on
31 May, 2024 by Robin Long, Field CTO, Asia Pacific, Rapid7 | Supplied by: Rapid7Understanding the attack surface in its entirety is not just a tactical advantage; it is a strategic imperative.
Lack of customer confidence affecting security strategies: report
31 May, 2024 | Supplied by: LogRhythm IncA survey from LogRhythm finds three-quarters of ANZ companies changed their security strategy having lost deals due to customers' lack of confidence.
Why the success of modern cyber defence hinges on identity security
22 May, 2024 by Scott Hesford, Director of Solutions Engineering Asia Pacific and Japan, BeyondTrust | Supplied by: BeyondTrustA single compromised identity could easily provide the keys to the kingdom if it isn't properly secured.
IMT sector was Australia's most targeted in 2023: report
17 May, 2024 by Dylan Bushell-EmblingThe information, media and technology sector has been the Australian industry most targeted by threat actors in 2023 in a report from Ensign InfoSecurity.
Emergency onboarding: what to do before and after a data breach
09 May, 2024 by James Richmond, Regional Director ANZ, Akamai Technologies | Supplied by: Akamai TechnologiesOrganisations that have an emergency onboarding plan are better positioned to have their business back up and running quickly in the event of a data breach.
ISACA identifies gaps in AI knowledge, training and policies
09 May, 2024 | Supplied by: ISACA85% of digital trust professionals say they will need to increase their AI skills and knowledge within two years to advance or retain their jobs.
Savvy directors are demanding more points of proof when cyber incidents occur
08 May, 2024 by Scott Mann, Incident Response Team Lead – APAC, Check Point Software Technologies | Supplied by: Check Point Software Technologies LtdPre-agreement on what a post-incident forensics effort should produce — and testing it out before use — is now 'table stakes' for incident response.
VNC accounts for nearly all remote desktop attacks
08 May, 2024 by Dylan Bushell-Embling | Supplied by: Barracuda NetworksVirtual Network Computing accounted for 98% of remote desktop attacks recorded by Barracuda last year.
Vectra AI expands platform to combat GenAI threats
07 May, 2024 by Dylan Bushell-Embling | Supplied by: Vectra AIVectra AI has announced new enhancements to its AI-driven platform aimed at protecting businesses from threats introduced with the adoption of generative AI.
Cyber-attack prevention is better than a cure
06 May, 2024 by Nic Nuske, CEO, VeroGuard Systems,cyber-attack prevention | Supplied by: VeroGuard SystemsCorporate and political decision-makers need to invest in areas that do a better job of protecting Australians online and our future economic prosperity.
Australian ransomware payments average at $9.27 million
03 May, 2024 by Dylan Bushell-Embling | Supplied by: Sophos Pty LtdData from Sophos suggests that Australian businesses falling victim to a ransomware attack coughed up an average of nearly $10 million in 2023.