Australia's leading source of security and threat news
CyberArk launches privileged session management for cloud
An external attacker or malicious insider who is able to hijack these types of user credentials could shut down cloud environments.
The ethics of AI: How this technology can empower your business
Fundamentally AI is used to help automate repetitive tasks within businesses, however, it’s not always quite as easy as flicking a switch.
GitHub’s ‘universe of data’ empowers developers
“These past ten years have been the most transformative in tech,” says GitHub SVP Technology Jason Warner.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
New Zealand tops list of most-scammed countries - Microsoft
Around a fifth (21%) of New Zealanders who had encountered tech support scams were fooled into continuing with an interaction.
Gartner’s top 10 tech trends for 2019
Gartner has released a list of what it sees as the most important strategic tech trends to be aware of in the quickly upcoming year.
ManageEngine adds user behaviour analytics to ADAudit Plus
With its dynamic alert thresholds, ADAudit Plus reduces the number of false positives and buys ample time for security teams to focus on the real indicators of compromise.
Securonix and Cylance partner to drive end-to-end security offering
The two products will provide security operations centre (SOC) teams with a view of both cloud and endpoint security events.
A/NZ businesses taking IoT security more seriously - MapR
53% of A/NZ companies now believe that keeping IoT secure is the greatest challenge they face in rolling out their IoT capabilities.
Small businesses repeatedly falling victim to ransomware - Kaspersky
Many SMBs have fallen victim to multiple attacks – with 37% having experienced two or three infections.
Back to the basics: Five ways to stay safe online
Phishing attacks or social-engineering attacks are on the rise, where cybercriminals trick people into divulging details and participating in scams.
Mozilla delays distrust of Symantec TLS certificates
Mozilla has delayed its distrust of all Symantec security certificates – because so many businesses have failed to do anything about the problem.
Exclusive: Cybersecurity in the API economy
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
You’re invited: Getting proactive about security - an Empired webinar
We all know that proactive security is the best security, but what does that look like? Don’t miss your chance to find out.
Exclusive: CrowdStrike’s roundup of threats so far in 2018
“Increasingly, we see criminal groups are also using the techniques and tradecraft that were typically the domain of nation states to break into companies.”
Why protecting your DNS should never be an afterthought
Being such an integral part of the internet infrastructure makes DNS a popular target for cyber criminals looking to attack organisational networks and data.
Trend Micro’s four pillars of cybersecurity strategy
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
Frost & Sullivan: Pulse Secure among best NACs for SMB to large enterprise
The recent Frost and Sullivan 2018 Network Access Control (NAC) Market, Global, Forecast to 2022 report states that network visibility is critical.
Ten key steps to secure industrial control systems
Malicious groups and individuals worldwide are increasingly targeting critical infrastructure such as power and water supplies, telecommunications and transport systems.
Carbon Black announces enhanced cloud security offering
The Cb ThreatHunter announcement was made from the company’s annual user conference #CbConnect18 in New York.
The rise of the chief compliance officer – Digital Guardian
What does the role entail, and does your organisation need one?
Organisations still can’t get access management right - One Identity
These and other findings paint a bleak picture of how many organisations approach IAM and PAM programs.
ASG finds that compliance is the largest driver of data management initiatives
With the implementation of GDPR organisations are under tremendous pressure to establish and maintain compliance.
Cryptomining dethrones ransomware as 2018’s top threat - Webroot
This report also highlights the importance of implementing a robust and evolving security approach to protect valuable data and keep systems secure.
Exclusive: Why social media platforms are so vulnerable to cyber threats
Social media breaches, including the Cambridge Analytica-Facebook incident, accounted for approximately 56% of total records compromised in the first half of 2018.
Interview: Hitachi Vantara talks challenges of compliance in financial services
Technology is advancing a lot quicker, and the incumbent banks need to be more up to speed but are held back by a lot of legacy systems.
Credential theft industry booming in US, declining in Asia & EU
New research reveals the US is ripe for harvest, but Blueliv says the declines in EU and Asia are almost definitely only temporary.
Chinese espionage: Sweating Apple insists breach allegations are ‘not true’
The dust still hasn't settled on the report that caused Supermicro's stocks to collapse, and now Apple is stressing its innocence.
Google shutting down Google+ after covering up privacy bug
Google’s management was aware of the bug but chose not to share it with the public to avoid scrutiny by regulators.
Access to thousands of breached sites found on Russian underground market
A number of the available servers investigated by Flashpoint led analysts to conclude that most of the breaches are from either US, Russian, or German hosting services.
Industrial control systems: How to approach OT cybersecurity
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.
Machine learning is a double-edged sword for cyber security
IT departments and security decision-makers need to understand the complexity of AI in cyber security, and how to strike a balance between risk and reward.