Stories by Mark Lukie
Bad bots make up 30% of internet traffic and they’re after APIs
APIs are designed to connect and share data with other applications – and it can be easy to underestimate just how exposed that data is.
How OT/IT security gaps threaten industrial transformation in Australia
To reap the full benefits of Industry 4.0, security teams need to understand what they can do to harden their legacy systems.
SASE – Take security to users, not make them come to you
One platform with a single pane of glass provides secure access for users to the services they need or want, when they want them, wherever they are. .
You’ve dealt with the ransomware, how come it’s back?
The research shows that in 2022, 33% of Australian ransomware victims were hit more than once, highlighting the need for improved cybersecurity measures.
The costs of email breaches that hit over 70% of Australian companies
Email remains the most widely used business communication channel. It is also an attractive target for cybercriminals.
Why cloud-based resources still need effective backup
As businesses have come to terms with the benefits of cloud platforms, many are working to shift their IT workloads to this more flexible environment.
The 'A-B-C' of effective application security
Software applications have been a key tool for businesses for decades, but the way they are designed and operated has changed during the past few years.
The business benefits of cloud-to-cloud backups
By taking the time to review how data is being stored and protected, organisations can take advantage of these tools while maintaining effective data security.
Bait, hook and catch – targeted spearphishing on the rise
Cyber heists evolve; firms targeted with cunning spearphishing scams, says FBI.
Caught in the wild: A look at email scams and spam
Every day cybercriminals come up with a wide variety of phishing tactics with the intent of scamming innocent users.
Collaboration tool APIs leaving organisations vulnerable
Alongside the migration to the cloud has been the rise of application programming interfaces (APIs) and artificial intelligence (AI).
What to consider when moving into the cloud generation… securely
IT professionals are starting to realise just how different securing a cloud computing environment is from traditional on-premises IT environments.
Move over ransomware; put spear phishing on your radar
Spear phishers continue to exploit security weaknesses in organisations using social engineering. It’s becoming the most significant security threat.