Digital Transformation / DX
Artificial Intelligence / AI
Internet of Things
Cybersecurity strategy stories
Traditional solutions fail to secure organisations against today's malware
"Traditional anti-malware solutions alone are simply insufficient for today's threat environment. Every organisation needs a layered, proactive security strategy that involves machine learning and behavioural analysis."
How to address cyber-threats as a strategic risk
Becoming a cyber-secure organisation in the face of an evolving threat landscape requires a strategic, business-focused approach to security as opposed to a tactical approach in which security is addressed simply by implementing new tools.
Companies not utilising threat hunters correctly – study
“Responding to threats is important for security, but it is not the main task of the threat hunter.”
75% of DevOps professionals say certificate issuance policies slow them down
Less than half of DevOps professionals believe developers always request certificates that serve as machine identities through authorised channels.
Organisations still not getting cybersecurity fundamentals right - Wavelink
Research shows that nearly 60% of organisations that suffered a data breach in the two years between 2016 and 2018 fell victim to a known vulnerability with patches available.
AiSP launches ladies in cybersecurity mentorship programme
The initiative aims to plug the industry’s talent gap, spur female participation in cybersecurity, and transform the role women play in Singapore’s cyber defence.
Business security performance impacting bottom line - Thycotic
When cybersecurity teams do not meet their targets, it impacts the CEO with longer hours, job insecurity, shareholder pushback, and bonus reductions.
Nine ways to boost IT security during the summer holidays
With fewer users to manage, IT teams will likely have more capacity to carry out tasks that might have been overlooked during the busy business year.
How user-centred design is reshaping cybersecurity
A user-centered design approach starts with users and asking them what they want to gain a deeper understanding of their needs.
Time to turn the tables on cyber-attackers
Cyberattackers are no strangers to deception and trickery, and emerging ‘deception technology’ is giving the defending team an opportunity to turn the tables in their favour, Attivo finds.
How to level up Australia’s cybersecurity productivity – CrowdStrike
The Productivity Bulletin showed that productivity levels in Australia has been declining in key industries since 2013, falling behind global peers.
Forcepoint increases cloud security presence to cover 128 countries
This PoP expansion brings Forcepoint services to virtually anywhere in the world while delivering optimal security and productivity enhancing capabilities.
Fortune 500 companies failing to demonstrate cybersecurity commitment - Bitglass
The report found that 38% of the 2019 Fortune 500 do not have a chief information security officer (CISO).
Why businesses need a strategy to combat the enemy within – Ping Identity
While strengthening your organisation’s external defences with the latest tools and technologies makes sound sense, it’s only half a battle plan.
Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard
Enterprises looking to reduce the risk of cyber-compromise or attack need to think about adding multi-factor authentication technology to their arsenal.
Board members in A/NZ most engaged in cybersecurity – Infosys
The research highlights how cybersecurity is a top priority for organisations in the A/NZ market, with boards taking a more hands-on approach to cybersecurity.
Govt invests $8m into refreshed Cyber Security Strategy
The Government has refreshed its approach to New Zealand’s cybersecurity, with more focus on partnerships, funding, and international participation.
Security risks of neglecting the workforce experience – Avaya
Government departments and enterprises are wasting millions of dollars every year on cybersecurity because they fail to also invest in the user experience.
Exclusive: VMware’s challenges and opportunities in cybersecurity
While it’s still critically important to have a strong perimeter, it is widely accepted now that the status quo of security simply doesn’t work anymore.
Deakin Uni scores double win with Exabeam partnership
Australia’s Deakin University is partnering with SIEM security company Exabeam in an effort to boost the university’s cybersecurity degree program and strengthen its SIEM capabilities.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
How business leaders must prioritise cyber risk - Palo Alto Networks
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
Flashpoint: Contextual data key to effective security
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.