The ease with which cloud-based architectures facilitate third-party communications will make them a key security risk in coming years, security experts have warned as Australian firms rush headlong into the cloud without fully considering its implications.
By David Braue |
02 Dec |
Read more
‘Isolation’ architecture prevents malicious online content from reaching users’ devices
David Braue |
21 Oct |
Read more
Over the first 6 months of 2019, I am seeing more and more accounts being taken over by malicious actors on office 365 and google mail where the attacker will create some rules in the backend to redirect emails of interest into deleted items, RSS feeds or any other folder they think may be overlooked by the user.
Craig Ford |
26 Jun |
Read more
After Apple blocks Titan keys on iOS devices. Bluetooth might not have been such a good idea after all.
Liam Tung |
12 Jun |
Read more
Cisco Live! 2019 emphasised the role of analytics, automation, and other software in building responsive security architectures
David Braue |
15 Mar |
Read more
The week in security: Cybercriminals celebrate NDB’s first anniversary with... more breaches
David Braue |
25 Feb |
Read more
While spending on cybersecurity expertise would seem to be a no-brainer, the large number of companies without formal inhouse expertise suggests another ongoing, underlying challenge in finding and securing those skills within the current competitive market.
By CSO staff |
22 Feb |
Read more
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
CSO staff |
21 Nov |
Read more
No more passwords, Microsoft promises.
Liam Tung |
25 Sep |
Read more
Interest in cybersecurity carers has surged so quickly that The Australian Cyber Security Growth Network (AustCyber) had to turn students away from the speed-networking event it threw with industry supporters during this week’s Cyber Week festivities.
David Braue |
02 Aug |
Read more
Cybercriminals’ surging interest in cryptocurrency miners has seen the quickly-evolving technique apparently displacing ransomware, a new analysis has found, as instigators work to keep ahead of enterprises’ slowly-maturing information defences.
David Braue |
28 Mar |
Read more
When it comes to security, small businesses need all the help they can get – and the government made an effort to give them a bit.
David Braue |
15 Jan |
Read more
Australia will also join US and UK in condemning North Korea for the WannaCry.
Liam Tung |
20 Dec |
Read more
Revelations that 30GB of sensitive Australian military data were exfiltrated from a subcontractor have underscored the risk faced by Australian companies that continue to leave themselves exposed by failing to employ “established and relatively straightforward cyber security measures”, the federal government’s peak cybersecurity body has warned as new data points confirms that local businesses are seeing increasing losses to cyber-attackers.
David Braue |
06 Nov |
Read more
The days of cybersecurity being treated as a technology concern have passed us by. Cybersecurity is now and will remain a strategic business risk.
Matt Loeb |
01 Nov |
Read more
The controversial application of face-recognition technology to millions of Australian driver’s license photos is a “relatively small database” in global terms, according to a biometrics executive who says today’s face-recognition algorithms are fast enough to scan thousands of faces at a time and robust enough to secure everyday financial transactions.
David Braue |
11 Oct |
Read more
Small organizations still struggle to stay on top of threats and keep their networks and IT assets safe, even as larger organization lay the groundwork to tackle future challenges, a new survey of security and IT decision-makers reveals.
CSO staff |
04 Oct |
Read more
Google researchers found seven severe security flaws in the open-source DNS software package Dnsmasq. The flaws put a huge number of devices at risk of being hacked.
Ms. Smith |
04 Oct |
Read more
Long-term retention of telecommunications metadata helped law-enforcement authorities access 40,425 metadata records that were 3 months old or older, the Attorney-General’s Department has revealed in its first glimpse of the performance of its controversial telecommunications metadata retention scheme.
David Braue |
15 Aug |
Read more
Recent ransomware attacks underscore the importance of a unified global response.
Matt Loeb |
02 Aug |
Read more