Leading CISO Wants More Security Proactivity in Australian Businesses to Avoid Attack ‘Surprises’

Rapid7’s Jaya Baloo says a deficit in Australian organisational IT asset and vulnerability understanding is helping threat actors, and this is being exacerbated by fast growth in multicloud environments. Read more »

What Australian IT Leaders Need to Focus on Ahead of Privacy Act Reforms

The Australian federal government aims to deliver changes to privacy laws in 2024. Organisations are being warned to prepare ahead of time by creating a comprehensive map of organisational... Read more »

New Critical Zero-Day Vulnerability Affects Web UI of Cisco IOS XE Software & Allows Attackers to Compromise Routers

The number of devices exposing the web UI on the internet, a timeline and technical details about this malicious activity, and tips for mitigating this zero-day threat are featured. Read more »

New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware

Microsoft OneDrive accounts for 26% of the overall usage of cloud storage apps to host malware, ahead of Microsoft PowerPoint and GitHub. Read more »

Software Supply Chain Security Attacks Up 200%: New Sonatype Research

Sonatype’s 9th annual State of the Software Supply Chain also covers regulations and how AI could help developers protect organizations from security risks. Read more »

Is Collaboration The Key To Aussie Tech Challenges?

As Australian organisations and government departments continue to struggle with IT resourcing, a new wave of collaboration potentially represents the solution. Read more »

Power Checklist: Vetting Employees for Security Sensitive Operations

Most organizations have applications, processes and data that must be kept secure by authorized personnel. Determining the eligibility of individuals to access or administer these components can be a... Read more »

GDPR Consent Request Forms: Sample Text

The European Union’s General Data Protection Regulation requires every organization that collects sensitive personal data from those residing in the EU to ask for clear and specific consent before... Read more »

New CISA and NSA Identity and Access Management Guidance Puts Vendors on Notice

This CISA-NSA guidance reveals concerning gaps and deficits in the multifactor authentication and Single Sign-On industry and calls for vendors to make investments and take additional steps. Read more »

Avast SecureLine VPN Review (2023): Is It a Good VPN for You?

Read our comprehensive review of Avast SecureLine VPN. We analyze its features, speed, security, and more to determine if it is the best VPN option for you. Read more »
Subscribe to our Newsletter