Cash injection drives Menlo Security to Australian launch
‘Isolation’ architecture prevents malicious online content from reaching users’ devices
David Braue | 21 Oct | Read more
‘Isolation’ architecture prevents malicious online content from reaching users’ devices
David Braue | 21 Oct | Read more
Financial institutions will be expected to exhaustively evaluate the information-security practices of strategic partners and service providers from July 1, as new CPS234 regulations take effect in a process that will light a fire under industry compliance efforts – and threaten banks with fines if they don’t stop cyberattacks.
David Braue | 26 Jun | Read more
Office 365 is a name that is widely known and is the preferred email hosting platform for many organisations in Australia (unless you're a Google fan.
Craig Ford | 15 Apr | Read more
Security professionals need to stop thinking about cybersecurity threats as being internally or externally focused and understand that the two forms of attack are intrinsically related, a cybersecurity expert has advised in the wake of survey findings suggesting Australian executives see internal threats as the biggest perceived threat to information security.
David Braue | 30 Nov | Read more
Distributed denial of service (DDoS) specialists can shut down an attack in 90 seconds once it’s detected – but if you take more than 3 hours to respond you’re likely to be compromised by a related attack in the meantime, warns a security expert who is seeing easy-to-source DDoS attacks becoming smokescreens for brazen data theft.
David Braue | 17 Oct | Read more
Nearly all security executives anticipate being attacked online this year but nearly half believe their cybersecurity team lacks the resources to address anything beyond simple security issues, according to new ISACA research that reinforces the growing risks posed by an increasingly-expensive cybersecurity climate.
David Braue | 07 Jun | Read more
The recent distributed denial of service (DDoS) attacks on managed DNS provider Dyn, which knocked out top websites like Spotify, Amazon and Twitter, has forced lawmakers to search for answers to the problem of inherently insecure Internet of Things (IoT) devices, such as webcams, DVR, printers and routers.
Poor planning and communication, and an overdependence on outsourcer IBM, contributed to a disastrous eCensus that was exacerbated by the lack of a comprehensive security framework and independent validation, a scathing enquiry into the August online debacle has concluded.
David Braue | 28 Nov | Read more
There were concerns that enterprises were focusing too much on protecting themselves from sophisticated attacks and leaving themselves open to attackers utilising common techniques, while some analysts were warning that the incessant focus on security was causing password and security fatigue for users and CISOs alike. Little wonder many companies are keen to phase out passwords completely.
David Braue | 17 Oct | Read more
Group of 7 nations have published new guidelines to harden the financial sector against cyberattacks that could cause system-wide disruptions.
Nearly three-quarters of cyberattacks are going unreported even as a flood of data and fraudulent attacks sees executives losing control of their sensitive corporate data, according to a new UK survey that confirms Australia isn't the only place where cybersecurity is spiralling out of the control of business leaders.
David Braue | 04 Mar | Read more
SAP has appointed former Yahoo security chief Justin Somaini as its new CSO as a new study claims to show that firms underestimate the risks SAP security poses to profits.
A number of Ukrainian power companies are seeing fresh cyberattacks following ones in December that briefly knocked out power for tens of thousands of customers.
Jeremy Kirk | 21 Jan | Read more
This week's appointment of two Australian security experts to the 11-member board of directors of peak security body ISACA reflects broad recognition of Australian information-security capabilities and will offer significant new opportunities to apply them to benefit the world's security community, according to one of the new appointees.
David Braue | 12 Jun | Read more
Verizon’s “2015 Data Breach Investigations Report,” released today, reveals cyberattacks are becoming increasingly sophisticated, but that many criminals still rely decades-old techniques such as phishing and hacking.
Anthony Caruana | 17 Apr | Read more