Cybersafety stories
There used to be two certainties in life: death and taxes. For organisations at least, there is now a third — compliance with cybersecurity regulation.
Empowering humans to engage in critical thinking is vital to efficient detection and response, writes ThreatQuotient APJC regional director Anthony Stitt.
Two-thirds of Australian CISOs see cloud account compromise as the most significant risk to their organisation in the next year.
Few organisations have matured their security operations (SecOps) to the point where they have integrated a complete CTI practice.
Here are three ways that myths are spread by Shark Week and how they are analogous to the myths currently percolating in cybersecurity marketing.
Forcepoint, the cybersecurity company, has appointed Rees Johnson as its new chief product officer, overseeing its entire product portfolio.
With this approach, technology services providers can build a robust cybersecurity practice that protects their customers' businesses from cybercriminals.
It's likely that organisations will need to find a way to work alongside COVID-19, which will probably involve a hybrid approach to work.
The report found increasing instances of ransomware victims experiencing multiple breach events, as well as a rise in the average ransom payment.
As organisations ramp up their digital transformation efforts, there are three key areas that business executives must consider to bolster cybersecurity.
Now that CEOs across ANZ properly understand cybersecurity and cyber-risks, it's time to get the board of directors up to speed.
Raccoon Stealer, a malware platform that rents out its services for $75 a week, has upgraded its services, according to a new report from Sophos.
Security posture management company Skybox Security has announced an 'accelerated global expansion' following a surge in customer demand.
IT and security professionals face growing complexity as remote work and cloud services become the norm, making smarter security solutions crucial.
An effective CTI program requires the alignment of people, processes and technology, writes ThreatQuotient APJC regional director Anthony Stitt.
TLS 1.2, the improved version of the Transport Layer Security protocol, is crucial for data security as TLS 1.0 and 1.1 become unsupported.
In 2021, organisations must focus on security as the foundation for safely creating, storing and managing data.
The ability to correlate individual events/alerts over time into an attack 'storyline' can help mitigate major cloud security blind spots.
Armed with vArmour's solutions, the company says that Microsoft's customers can now gain more visibility over user access to critical applications.
Autonomous Response is necessary not only because humans cannot keep up with today's threat climate, but because AI-based attacks are approaching.