SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 706

Story image
Security experts demonstrate that ransomware attacks on robots are possible
Tue, 13th Mar 2018
#
malware
#
robots
#
ransomware
Researchers at IOActive have conducted what could be the world's first ransomware attack on robots, potentially disrupting the booming robotics market.
Story image
NSW Auditor-General uncovers State's inconsistent approach to cybersecurity
Tue, 13th Mar 2018
#
breach prevention
#
cybersecurity
#
security breaches
New South Wales' public sector lacks the capability to effectively detect and respond to cybersecurity incidents, warns the state's Auditor-General.
Story image
Anti-tracking browser extension Ghostery goes open source
Tue, 13th Mar 2018
#
open source
#
data privacy
#
cybersecurity
Ghostery, a free web browsing software, has announced that its code is now publicly available on GitHub as the company goes open source.
Story image
Check Point expands portfolio to continue fight against Gen V cyber attacks
Tue, 13th Mar 2018
#
cybersecurity
#
cyber attacks
#
ipsec
Check Point partners with IPSec to offer 24x7 SOC services, expanding its security portfolio against Gen V cyber attacks and enhancing enterprise protection.
Story image
Musk says AI 'more dangerous than nukes' - expert stays optimistic
Tue, 13th Mar 2018
#
ai
#
cybersecurity
#
cybercrime
Elon Musk spoke at SXSW and used examples of AI's rapid advancements to show why it ‘scares the hell’ out of him - Kolochenko remains optimistic.
Story image
New research finds China tampering with public vulnerability data
Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Story image
IoT attacks, ransomware, and steganography? Fortinet looks at the latest cybercrime trends
Mon, 12th Mar 2018
#
malware
#
firewalls
#
network infrastructure
Fortinet says that stenography as an attack vector hasn’t had too much visibility in the last several years but it could be the start of a resurgence.
Story image
From reactive to empowered: Building a case for automation within your security operations team
Mon, 12th Mar 2018
#
malware
#
ransomware
#
siem
Here are three questions every security leader can focus on to make automation a reality within their organisation.
Story image
Cisco unveils its top five strategic business pillars for 2018
Mon, 12th Mar 2018
#
uc
#
network infrastructure
#
data analytics
Cisco has unveiled its five strategic business pillars for 2018, focusing on security, network reinvention, multi-cloud, data utilisation, and collaboration.
Story image
Cryptomining malware a genuine threat to organizations, NTT Security says
Mon, 12th Mar 2018
#
malware
#
blockchain
#
cybersecurity
There are more than 12,000 Monero mining malware samples 66% of which were submitted between November and December 2017.
Story image
Why a secure perimeter is no longer enough protection for your IT infrastructure
Mon, 12th Mar 2018
#
mfa
#
mdm
#
iam
Digital identity is used as the key method of protecting digital assets regardless of their location or how they are being accessed.
Story image
BSA settles $347,000 in damages against Australian firms that used unlicensed software
Mon, 12th Mar 2018
#
breach prevention
#
cybersecurity
#
bsa
BSA The Software Alliance settled over USD $347,000 in damages against 28 Australian firms using unlicensed software in 2017, double the previous year.
Story image
Australian firms face cybersecurity inertia as the struggle to keep up takes its toll
Mon, 12th Mar 2018
#
devops
#
pam
#
apm
Australian organisations are being left stranded in a haze of inertia about their cybersecurity strategies, even after a cyber attack has hit them.
Story image
Six simple tips to staying safe online
Mon, 12th Mar 2018
#
cybersecurity
#
smb
#
cybersafety
Companies often think they’re too small or insignificant to be a target for cybercriminals but every business is a potential target.
Story image
Learning from the past to protect the future of IoT and cloud
Mon, 12th Mar 2018
#
cloud security
#
iot security
#
iot
Cyber attackers are likely to use known vulnerabilities this year despite advancements in their threats, says ForeScout.
Story image
Open for opportunity: What's driving security pros to consider another job
Mon, 12th Mar 2018
#
soc
#
network monitoring
#
skills gap
Only 15% of employees say they have no plans to switch jobs this year; 14% plan to look for a new role and 70% are open to new opportunities.
Story image
New rapid voice cloning tech could spell end for voice authentication
Sat, 10th Mar 2018
#
biometrics
#
cybersecurity
#
voice control
Baidu unveiled a new system that can clone your voice using just 3.7 seconds of audio, a scary thought in the era of voice biometric authentication.
Story image
Interview: A chat with SolarWinds' Destiny Bertucci and how she discovered IT security
Fri, 9th Mar 2018
#
cybersecurity
#
solarwinds
#
iwd
International Women’s Day may have passed, but there’s no reason why society shouldn’t keep up that recognition every day of the year.
Story image
Engineer says Emirates is virtually handing customer data to hackers
Fri, 9th Mar 2018
#
storage
#
breach prevention
#
wireless networks
After the allegations about Emirates' customer data policies emerged, High-Tech Bridge ran a test on the site's security - with interesting results.
Story image
FEATURE: Tech’s female powerhouses tackle women shortage issue
Thu, 8th Mar 2018
#
it automation
#
skillsoft
#
it careers
International Women's Day is here and what better time to tackle the elephant in the room that is the huge gender disparity in the technology sector.