The ease with which cloud-based architectures facilitate third-party communications will make them a key security risk in coming years, security experts have warned as Australian firms rush headlong into the cloud without fully considering its implications.
By David Braue |
02 Dec |
Read more
The Australian Cyber Security Centre (ACSC) as it sought to raise awareness and protection around the surging Emotet malware, which was fingered in the recent malware attacks on Victorian hospitals and nearly two dozen other Australian victims.
David Braue |
07 Nov |
Read more
The overall risk posed by cybersecurity threats has increased over the past 12 months and adoption of cloud technologies is by far the biggest reason, according to new research that found just 31 percent of organisations can mitigate a new risk within a month.
David Braue |
07 Nov |
Read more
If you use Trend Micro consumer anti-virus and you've been getting scam tech support calls, now you know why.
Liam Tung |
07 Nov |
Read more
Can the world handle the 'Donald Trump Screen of Death'?
Liam Tung |
06 Nov |
Read more
Google brings site isolation to Chrome on Android and improves the defense for Chrome on the desktop.
Liam Tung |
18 Oct |
Read more
Patch "without delay", Oracle tells its big enterprise customers.
Liam Tung |
17 Oct |
Read more
Open source Metasploit has released a new BlueKeep exploit module, making it even more critical for organizations to install Microsoft's patch now.
Liam Tung |
10 Sep |
Read more
A series of dynamic technical talks at the inaugural CSO Australia-AWSN Women in Security conference highlighted the innovative perspectives and problem-solving nous that women bring to cybersecurity roles.
David Braue |
04 Sep |
Read more
The realities of supply and demand apparently triggered a rise in the price of Android exploits, so much so that they're now more expensive than iOS exploits.
Liam Tung |
04 Sep |
Read more
Google study shows why credential stuffing attacks work.
Liam Tung |
16 Aug |
Read more
Attackers claim to be wiping devices and asking for a ransom from Iomega NAS users.
Liam Tung |
30 Jul |
Read more
And thanks to the European Commission for funding a bug bounty for VLC.
Liam Tung |
10 Jun |
Read more
The employment market is hungry for “future focused” executives with the ability to manage cybersecurity risk at the board level, according to a recent jobs market update that also found employers put a premium on executives who understand the need to continually test systems through regular red-teaming and penetration testing.
David Braue |
29 May |
Read more
Business email compromise (BEC) scams account for more than half of total losses
Liam Tung |
24 Apr |
Read more
Four popular vendors' VPNs offer hackers a way to replay private sessions.
Liam Tung |
16 Apr |
Read more
Admins managing Cisco's RV320 and RV325 routers should definitely install new firmware available today.
Liam Tung |
05 Apr |
Read more
FBI warns consumers over the Chinese embassy scam.
Liam Tung |
29 Mar |
Read more
Threat intelligence has become a nice-to-have for many vendors seeking to improve their security offerings, but for the executives leading Cisco’s Security Business Group it’s just the framework for a product-development process that is focused on maintaining a consistent, end-to-end network security architecture while supporting all manner of front-facing customer innovation.
David Braue |
06 Mar |
Read more
Securing an increasingly complex landscape of user devices requires enterprises to re-examine their benchmark for trust, according to a Cisco Duo executive who noted that many companies are sticking to long-discredited trust models built around easily compromised user credentials.
David Braue |
05 Mar |
Read more