ASIC research shows 44% of Australian organisations are not managing third-party supply chain risk. Tesserent says it remains a key risk, and disruption could emerge from geopolitical tensions. Read more »
The ransomware group, which has distributed ransomware to more than 1,000 victims, reportedly recovered control of its website on Tuesday. Learn how to defend against ransomware. Read more »
Ransomware attacks on infrastructure and mid-market businesses are tipped to rise, while the use of AI cyber tools will grow as IT customers seek more signal and less noise... Read more »
Australia is about to get a national online ID system — the Digital ID — which promises to improve the security and privacy of data online. However, concerns among... Read more »
As the year comes to a close, Mac users should take these steps to ensure their device’s security, performance and organization. Read more »
Cyber scams pose a significant threat to organizations of all sizes, regardless of their industry or geographic location. This article from TechRepublic Premium digs into the nature of these... Read more »
Learn about the different types of VPNs and when to use them. Find out which type of VPN suits your needs with this comprehensive guide. Read more »
Zero-trust security operates on the fundamental premise that trust should never be assumed, regardless of whether a user or device is inside or outside the corporate network. In this... Read more »
Google also announced Duet AI for Developers and Duet AI in Security Operations, but neither uses Gemini yet. Read more »
Google’s updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords. Read more »