Technology news for Australia's largest enterprises
These search results are from across the Techday network of sites
SOC roles and responsibilities evolving with threats - Exabeam
Keeping up with security alerts presented the largest pain point experienced by SOC personnel.
Untagged data a major risk to businesses - Veritas
Over half of company data remains unclassified, despite a rise in security breaches and stringent data protection regulations.
Emotet drove 61% of malicious payloads in Q1 2019 - Proofpoint
“The massive shift in Emotet’s prevalence and classification highlights just how quickly cybercriminals are adapting new tools and techniques across attack types.”
Enterprise IoT ecosystem extends beyond corporate devices - Zscaler
The most commonly detected IoT device categories across the Zscaler cloud were IP cameras, smart watches, printers, smart TVs, among others.
Companies struggling with hybrid IT and zero trust controls – Pulse Secure
61% of IT organisations have little to modest confidence to mitigate access security threats, despite a majority significantly increasing their near-term budget.
Almost one-fifth of UK public sector reported over 1,000 cyber attacks
SolarWinds found the most common attacks were phishing (95%) and malware (86%), with a large step down to third place, ransomware (54%).
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
How digital transformation will increase revenue for the Australian construction industry
“We hope the report will provide industry, government and the education sector with information about how technology is being adopted."
NDB report: Stronger authentication practices needed
The Australian Information Commissioner (OIAC) has released the latest quarterly report on the notifications under the Notifiable Data Breaches scheme.
Risk readiness at an all-time low as Australian businesses face increasing market volatility
“Australian businesses are finding themselves operating in a very difficult environment."
Unisys: Users looking for data security when choosing banks
The report studied attitudes of banking customers in Hong Kong, Australia, New Zealand, the Philippines and Taiwan.
One-third of A/NZ business looking to hire security-specific skills - CompTIA
A range of skills is needed to secure modern infrastructure, respond to incoming threats, and ensure proper operations.
Failure to prioritize cybersecurity stunting digital transformation – Frost & Sullivan
Security leaders need to look beyond perimeter security, leverage automation, and have a better grasp of the psychology of both cybercriminals and their business users.
Ericsson report uncovers the consumer potential of 5G
Video consumption is set to rise significantly with 5G.
61% of IT professionals have experienced serious data breach - McAfee
Data breaches are becoming more serious as cybercriminals continue to target intellectual property.
Email attacks targeting financial services up 60% - Proofpoint
These attacks are socially engineered to target specific people within financial services organisations who can execute requests on the attacker’s behalf.
‘Blockchain bandits’ brute-forcing weak Ethereum private keys
Independent Security Evaluators (ISE) has found that poorly implemented private key generation is facilitating the theft of cryptocurrency.
Cyber threats progressing as defenses evolve - Trustwave
The findings illustrate cybercriminals deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.
What is blockchain good for?
"It’s been over a decade since blockchain was first introduced and though the hype has faded, distributed ledger technology is far from dead."