Australia's leading source of security and threat news
These search results are from across the Techday Network of sites
Report finds AI is a key cybersecurity weapon in the IoT era
Increasingly, security professionals are looking to artificial intelligence (AI) as a key weapon to win the battle against stealthy threats inside their IT infrastructures.
Cost of cyber attacks up 62% in five years - report
Malware infections globally are the most expensive cyber attacks – costing $2.4 million per incident.
How to effectively address security challenges in a digital healthcare world
It’s important for healthcare firms to maintain organisation-wide security that is both up-to-date and automated, says Wavelink.
INTERVIEW: SolarWinds MSP security VP lays industry bare
Cybercrime is a business and the rising number of attacks is not a result of criminals getting smarter -most businesses just have poor cyber hygiene.
STUDY: How security managers protect data in public and private clouds
More data is being stored in the cloud, where IT departments have less control over it – and this trend is only set to continue.
Aussie firms slow to adopt 'breakthrough innovation' for cyber defence
Australian businesses need to be on the lookout for malicious insiders, phishing and social engineering or face price tags of as much as $137,000.
Citrix report: Every generation brings different cybersecurity risks to work
Millennials risk data confidentiality; Gen Xers are most likely to be negligent about security policies & baby boomers may fall for phishing scams.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?