Advertisement

cia triad security triangle glowing binary process by nolimit46 getty 2400x1600

The week in security: Time to reconsider your security architecture?

Security experts have warned about credential stuffing attacks for some time – but new research suggests that the APIs used by cloud-based services are becoming facilitators for those attacks, particularly in the increasingly-open...


Kali Linux logo / gears / binary data

Kali Linux explained: A pentester’s toolkit

Kali Linux is the most popular penetration testing Linux distro, and jam packed with almost every offensive security tool you can think of.


RSA 2020's hottest products

Hottest new cybersecurity products at RSA Conference 2020

The annual RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out.


Advertisement

digital twins ai robots mirror image duo pair toy robots

How Kasada fights back against bots

Australian-based company Kasada seeks to undermine the economics of malicious automation


A hand places the last piece in a human resources puzzle.

Does your HR department protect Candidate Data?

Let’s face it – data is a gold mine. Whether it’s credit card information, login credentials or a list of names with email addresses, all data must be treated equally


Encryption rollout / encrypted data

SASE: what it is, and why you need to care

The big changes that have swept workplaces in recent years have brought both opportunities and challenges for management and staff. Armed with an increasing array of mobile devices and given access to cloud-based resources, many...


abstract background technology data binary plotted points by ivanastar gettyimages 901412996 100817

Five key insights into Zero Trust and why it’s important

When it comes to building effective IT security, traditional approaches have tended to resemble the construction of a walled garden. Core systems and data stores are held centrally and protected by a perimeter of firewalls and...


5G mobile wireless network

5G security is a mess. Could digital certificates help?

5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages.


CSO > breakthrough / penetration testing / hammer breaking binary glass

11 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do.


4 .social media

Buying less, doing more: how the Security Operations Centre model can help Australian enterprises take greater control of their cyber-security activities

‘Security solutions good, more security solutions better’ is the mentality behind high tech protection procurement in many Australian organisations but a new security model looks set to turn this traditional way of thinking on its...


Advertisement

artificial intelligence ai blockchain digital learning chip

Why AI and ML are increasingly important for effective IT security

With the evolving capabilities of artificial intelligence (AI) and machine learning (ML) attracting increasing interest, attention is being directed at how they can benefit IT security. Both vendors and customers are examining...


privacy breach hacked vulnerability binary eye

Is your home security system being hacked?

The Internet of Things (IoT) trend shows no signs of slowing down. In Australia, the market stood at $7.9 billion in 2018 and is projected to reach $25 billion by 2024, a dramatic increase that accounts  for the rising demand of...


Microsoft Threat Protection: an Israeli-built AI bundle of Redmond's security services

Microsoft has announced general availability of Microsoft Threat Protection — a bundle of existing cybersecurity services but with a twist of intelligence from the company’s investments in Israeli startups to create its R&D...


IoT > Internet of Things > network of connected devices

As IoT attacks soar, Stowe rewires its network security

With Australia awash in IoT attacks, electrical contractor takes a new architectural approach to limit its internal exposure


Ransomware

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks.