Security

The problem with passwords is not what you think

01 May, 2024 by Matt Caffrey, Senior Solutions Architect, Barracuda Networks | Supplied by: Barracuda Networks

When it comes to secure authentication, there seems to be a lesson we're not learning.


Veeam buys ransomware response company Coveware

26 April, 2024 by Dylan Bushell-Embling | Supplied by: Veeam Pty Ltd

Veeam has arranged to augment its cyber extortion incident response capabilities with the acquisition of Coveware.


Commvault arranges to buy Appranix

22 April, 2024 by Dylan Bushell-Embling | Supplied by: CommVault Systems Inc

Cyber resilience provider Commvault plans to leverage its acquisition of Appranix to help customers more rapidly recover from a successful ransomware attack.


Fujitsu establishes security consulting division

17 April, 2024 by Dylan Bushell-Embling | Supplied by: Fujitsu Australia

Fujitsu's new digital security consulting division will help organisations prepare for and respond to complex cyber threats.


Secure-by-design software development for digital innovation

16 April, 2024 by Craig Nielsen* | Supplied by: GitLab

The rise of DevSecOps methodologies and developments in AI offers every business the opportunity to create and maintain a new gold standard.


Bolstering AI-powered cybersecurity in the face of increasing threats

15 April, 2024 by Chris Fisher* | Supplied by: Vectra AI

The escalation of complex cyber risks is becoming a pressing issue for those in business leadership roles.


Unstoppable Domains joins GlobalBlock initiative

08 April, 2024 by Dylan Bushell-Embling

Web3 domain name service provider Unstoppable Domains has joined the GlobalBlock initiative to help protect brands against domain name spoofing.


How attackers are weaponising GenAI through data poisoning and manipulation

08 April, 2024 by Gabriel Moss, software engineer, Advanced Technology Group, Barracuda Networks Inc | Supplied by: Barracuda Networks

The possibility for shared large language models to be manipulated through data poisoning increases the possibility that models could collapse in on themselves.


Why SBOMs are critical in the fight against software supply chain attacks

04 April, 2024 by James Greenwood | Supplied by: Tanium

Amidst rising software supply chain attacks, we need to stop dragging our feet on SBOMs.


Safeguarding patient trust: email cybersecurity in Australian health care

03 April, 2024 by Mike Kleviansky, Head of Cyber Security, GenesisCare | Supplied by: Genesis Care

Protecting healthcare data is essential for the integrity, credibility and seamless operation of healthcare organisations.


AI adoption surging in the enterprise

03 April, 2024 by Dylan Bushell-Embling | Supplied by: Zscaler Australia Pty Ltd

The use of generative AI and other tools within the enterprise is rapidly increasing, which is exposing organisations to new cyberthreats, according to Zscaler.


Innovation and security: the challenges of generative AI for enterprises

01 April, 2024 by John Hopping, Senior Manager, Sales Engineering Asia Pacific, Cradlepoint | Supplied by: Cradlepoint Australia Pty Ltd

GenAI can be a double-edged sword, and organisations need to tread carefully when assessing security risk, especially when it comes to data protection.


Digital trust leaders outperform their peers: research

25 March, 2024 by Dylan Bushell-Embling | Supplied by: DigiCert

Companies categorised as leaders in implementing digital trust strategies are reaping the benefits with improved revenue and productivity, research suggests.


Nation-state actors have their sights on the cloud

21 March, 2024 by Nathan Wenzler* | Supplied by: Tenable APAC

Prioritising the protection of credentials and adopting robust security measures can better bolster defences against nation-state threats.


IT decision-makers believe AI is key to protect against cyber threats: report

20 March, 2024 | Supplied by: KnowBe4

According to reseach, 40% of Australian IT decision-makers believe the use of AI will help them protect their organisation from cyber attacks.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd