Cybersecurity stories - Page 1
Cybersecurity problems are business problems, report finds
"It is crucial that organisations recognise the need to adopt cybersecurity priorities as a central plank in their business strategy, and empower their cybersecurity leaders."
Five considerations for government departments to move safely and securely to the cloud
With a spotlight securely on Australia’s cybersecurity and defence strategy, it’s essential that Australian government departments lead the way.
New research finds 93% of security leaders don’t report to the CEO
New research from LogRhythm finds that 93% of security leaders don’t report to the CEO.
Rise in cyberattacks targeting container infrastructure and supply chains, 50% attacks happen with one hour
Aqua Security has found a rise in cyberattacks targeting container infrastructure and supply chains, with 50% of vulnerable targets attacked within one hour.
Managed cyber services crucial to secure infrastructure, data and processes
"With core MSSP services in place, security can be heightened to improve both the speed of detection and speed of response."
Majority of paid ransom demands experience repeat attack
"Paying the demands can have severe consequences, showing future attackers that the organisation could be easy pickings for some quick cash."
The most common attack surface trends by company location, size, and industry
A new report identifies the most common attack surface trends by geography and company size and highlights industries most vulnerable.
Interview: Assessing the challenges in securing emerging technologies
In his almost 20 years in the cybersecurity industry, Infosys CISO Vishal Salvi has watched threats change — and how they've ramped up in the last 18 months.
Trust no one: Recalibrating security to address insider threats
The high profile cases of Edward Snowden and Chelsea Manning also provide an enduring yet often overlooked lesson about insider attacks.
Macquarie opens new high security data centre in Australia's capital
The Intellicentre 5 Bunker (IC5) is critical infrastructure designed to support Australia’s data sovereignty, national cyber security and digital skills development, according to a statement from Macquarie.
Most organisations would consider paying in ransomware attack - study
One in five companies would consider paying 20% or more of their annual revenue.
Help desk responsibilities increase with advances in AI, cybersecurity, remote working, and cloud computing
CompTIA finds help desk responsibilities are broadening as AI, cybersecurity, remote working, and cloud computing becoming more prevalent.
Rapid device adoption reveals massive security gaps across BYOD initiatives
Organisations are ill-equipped to deal with growing security threats such as malware and data theft.
Warning: Fancy Lazarus DDoS extortion group resurfaces
"This is the first time we are seeing the bad actors selectively target organisations and favour those with unprotected assets for their ransom letters."
IDC names APAC Leaders in cloud security services sector
Seven vendors were designated Leaders in the space, with IDC noting that these providers demonstrated leadership in the provision of cloud-native security.
New wave of Fancy Lazarus DDoS extortion campaigns identified by Link11
A new wave of DDoS extortion campaigns by Fancy Lazarus has been identified by Link11.
Tech, finance sectors top targets for cyber attacks
"If threat actors can successfully compromise just one of these companies' systems, it can create a ripple effect that will impact large groups of organisations across industries and geographies."
Video: 10 Minute IT Jams - Bitglass director on the relationship between security and digital transformation
Jonathan Andresen, back for his third IT Jam, speaks about how cybersecurity fits into discussions and processes about digital transformation.
New plug-and-play edge product connects IoT devices and legacy infrastructures
Edge company Byos has launched a plug-and-play edge security product designed to provide secure connectivity for IoT devices and legacy infrastructures.
Growth in online investing highlights cybersecurity risks
A digital revolution is transforming the investment scene, but throwing up issues of security.
Why zero trust must form a key pillar of any cybersecurity strategy
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.
Over a third of workers have picked up bad cybersecurity habits while working remotely
A new report finds over a third of workers have picked up bad cybersecurity behaviours since working from home.
The rise of cybercrime and NZ's fragmented response
Cybercrime is on the rise but New Zealand's response to it is fragmented and victims rarely get justice. In the wake of the Waikato District Health Board ransomware attack, Anusha Bradley asks how we can better help and protect cybercrime victims.
Dealing with cyber criminals: Some NZ businesses 'feel they have no choice but to pay'
An increasing number of New Zealand businesses are paying ransoms to cyber criminals.