Advertisement

Internet of Things (IoT) / security alert / wireless network management

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk.


Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.


IT staff setting server hardware in a data center.

The 9 Windows Server security settings you need to get right

With all the improvements Microsoft has made in Windows and Windows Server, it’s time to evaluate whether your security settings are as effective as they could be.


Advertisement

workers / staff / employees / businessmen / corporate cubicles / offices

Australian companies struggling to fill cybersecurity positions

Faced with constant reports of serious breaches and an increasing need to secure critical data and systems, many Australian businesses are finding it almost impossible to hire sufficient cybersecurity professionals. Competitive...


hacker / hacking - crime / breach / phishing

Counter-hacking: Globally offensive, or worth a go?

Cybersecurity budgets in Asia are growing fast – more than 25% per annum in China, and around 20% per annum in parts of South-East Asia. And that’s a welcome sign, because the array and volume of threats faced by businesses both...


automation gears lightbulb machine learning ai innovation by bananajazz getty

How machine learning can secure corporate data in the Cloud

As organisations move growing volumes of data to the cloud, cyber security strategies need to be augmented with next-generation machine learning technologies in order to boost threat-protection capabilities. The shift to...


online shopping cart magecart hackers shopping online

Magecart-related arrests made in Indonesia

The three individuals arrested represent only a small portion of the Magecart web-skimming group, but the investigation is ongoing.


'I Voted' sticker / abstract data encryption / secure voting in elections

Why manipulation campaigns are the biggest threat facing the 2020 election

This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content. It's one of the nation’s greatest threats, especially as we approach the 2020 presidential election.


Job vacancy / staffing staffing problem  >  empty chair / binary code / lock + shield
Cybersecurity Snippets

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

Unable to hire their way out of cybersecurity staffing problems, CISOs are turning to process automation, advanced analytics, and third-party services, among other methods.


Conceptual illustration of the convergence of disparate technology threads in a digital environment.

Closing the security gap in OT/IT convergence

End-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here’s how to close the gap.


Advertisement

HAL9000-like red optical sensor / lens / eye [artificial intelligence]

Citrix races out more patches to fix critical bug, plus a free detection tool

The detection tool however won’t detect all compromises.


medical network h/ ealthcare IoT / hospital connections and communications

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications.


Tour de France cyclists racing / global digital broadcast connections

How the Tour de France secures its broadcast from disruption

Few sporting events have the scale and logistics challenges that the Tour de France presents. Event organizer ASO uses the cloud and tight physical security to avoid cyberattacks and broadcast integrity.


hacker / cryptocurrency attack

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.


cyber security shield lock protect

Safeguarding essential infrastructure from attacks in a digitised world: why Australian utilities need to put cyber-security on the agenda in 2020

The extraordinary life of operational infrastructure in utilities means that many devices that were never designed to be accessible from an IP network are now vulnerable to external attacks And even new systems like the Siemens...