Advertisement

4 .social media

Buying less, doing more: how the Security Operations Centre model can help Australian enterprises take greater control of their cyber-security activities

‘Security solutions good, more security solutions better’ is the mentality behind high tech protection procurement in many Australian organisations but a new security model looks set to turn this traditional way of thinking on its...


artificial intelligence ai blockchain digital learning chip

Why AI and ML are increasingly important for effective IT security

With the evolving capabilities of artificial intelligence (AI) and machine learning (ML) attracting increasing interest, attention is being directed at how they can benefit IT security. Both vendors and customers are examining...


privacy breach hacked vulnerability binary eye

Is your home security system being hacked?

The Internet of Things (IoT) trend shows no signs of slowing down. In Australia, the market stood at $7.9 billion in 2018 and is projected to reach $25 billion by 2024, a dramatic increase that accounts  for the rising demand of...


Advertisement

Microsoft Threat Protection: an Israeli-built AI bundle of Redmond's security services

Microsoft has announced general availability of Microsoft Threat Protection — a bundle of existing cybersecurity services but with a twist of intelligence from the company’s investments in Israeli startups to create its R&D...


IoT > Internet of Things > network of connected devices

As IoT attacks soar, Stowe rewires its network security

With Australia awash in IoT attacks, electrical contractor takes a new architectural approach to limit its internal exposure


Ransomware

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks.


Cisco sign

Cisco’s high-security Smart Software Manager has a critical flaw

Cisco has disclosed a critical flaw in a product called Cisco Smart Software Manager (SSM) On-Prem, a special version of its SSM software licensing management product aimed at organizations with organizations high security...


spooky halloween raven

The sinister world of shadow IT

Much like an episode of Stranger Things, IT has a dark side.


Many keys, one lock  >  Brute-force credential stuffing.

APIs are becoming a major target for credential stuffing attacks

New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable.


CSO > global security

How to set up your network to prevent data loss

Critical data is at risk from both insider and external threats. Here's how to configure your Windows network for data loss prevention (DLP).


Advertisement

Tortoise-defense formation of the Spartans  >  warfare / war games / red team binary target / attack

Unsigned firmware exposes millions of Lenovo, Dell and HP PCs to attacks

Security researchers have found multiple PC and laptop components that don’t require cryptographically signed updates are putting millions of Linux and Windows machines to attacks.   


AustCyber release

New AustCyber-funded projects target key cybersecurity industry pain points

Second round Projects Fund allocations will split $8.5m among 17 industry projects


A firmware message appears on a circuit board.

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems.


RSA 2020's hot new startups

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth.


CSO  >  security threats / laptop bombarded by attacks

Malware detections dropped more last year in Australia than anywhere else

Australia and New Zealand users bucked global trends in 2019 as the volume of cybersecurity threats dropped 14 percent last year, according to new analysis that also found Mac threats outpacing Windows threats for the first time...