SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Man-in-the-middle attacks stories

Poupak web res 1  1

Yubico appoints chief marketing officer as phishing grows

Last month
#
digital transformation
#
mfa
#
cloud security
Yubico names Poupak Modirassari Enbom as Chief Marketing Officer to help drive demand for phishing-resistant authentication amid rising AI-driven threats.
Leelin

Why businesses need wired, wireless, and power-over-ethernet (PoE) firewalls

Last month
#
firewalls
#
vpns
#
network infrastructure
Blended wired, wireless and PoE networks demand unified firewalls like SonicWall TZ to cut risk, complexity and long-term security costs.
Techday 9cd6d23835b1364328ae

Experts warn of AI-driven scams mimicking familiar voices

Thu, 5th Dec 2024
#
data protection
#
ransomware
#
phishing
Experts warn that AI technology is making scams more sophisticated, with deepfakes and vishing threatening personal information and finances.
Roger grimes high resolution 78

The problem with biometrics and the key things to consider

Tue, 21st May 2024
#
devops
#
surveillance
#
biometrics
Biometrics promise secure authentication, but they aren't foolproof. Issues with accuracy, hacking, theft, privacy, and bias complicate their efficacy.
Img yidcwlen3sldmf4ukadpmwtu

Wi-Fi chipset market poised to hit $34.5bn by 2033 with 4.4% CAGR

Fri, 2nd Feb 2024
#
semiconductors
#
iot
#
connectivity
Rising adoption of IoT devices, smart home appliances and widespread internet connectivity is set to push the Wi-Fi chipset market value beyond expectations.
Gettyimages 1477430518

BYOD and mobile devices heighten healthcare cyber risks

Fri, 15th Sep 2023
#
mdm
#
phishing
#
email security
Healthcare organisations possess high-value data that is highly regulated and, therefore, exceedingly valuable for attackers.
Data security

How to stop your data from getting hijacked - SolarWinds

Wed, 3rd Jul 2019
#
data protection
#
solarwinds
#
opinion
Organisations often struggle to avoid man-in-the-middle attacks because hackers target infrastructure the organisation has almost no control over.