Security

Growing fraud trends in Australian health care

20 March, 2024 by Jayesh Kapitan and Roger Darvall-Stevens* | Supplied by: RSM Australia

As the healthcare landscape evolves, so do the methods of fraud.


23% of connected healthcare devices vulnerable to attack

13 March, 2024 by Dylan Bushell-Embling

New research from Claroty indicates that a high proportion of medical devices connected to hospital and other healthcare networks are inadequately secured.


Overcoming the top cybersecurity challenges faced by public agencies

13 March, 2024 by Martyn Beal* | Supplied by: Trend Micro Australia Pty Ltd

With a new cybersecurity strategy out and the right approach to key challenges, the public sector can improve its cyber stance.


EKA CyberLock: securing critical infrastructure in a connected world

12 March, 2024 | Supplied by: EKA Cyberlock

EKA CyberLock combines the attributes of a proximity card access control system with those of a mechanical master key system.


Dynatrace completes IRAP assessment

06 March, 2024 by Dylan Bushell-Embling

Observability and application security company Dynatrace has been certified to manage Australian Government data up to the Protected classification level.


Ten steps to improving IT security in the public sector

04 March, 2024 by Les Williamson, Regional Director Australia and New Zealand, Check Point Software Technologies | Supplied by: Check Point Software Technologies Ltd

Best practice suggests that there are 10 key steps public-sector organisations can undertake that will significantly improve their overall level of IT security.


GCSB updates NZ Information Security Manual

04 March, 2024 by Dylan Bushell-Embling

New Zealand's Government Communications Security Bureau has published some minor updates to the New Zealand Information Security Manual.


China-linked attackers exploiting trusted relationships

28 February, 2024 by Dylan Bushell-Embling | Supplied by: CrowdStrike

A new report from CrowdStrike finds that China-nexus adversaries are increasingly exploiting trusted third-party relationships to compromise their targets.


82% of unis at high risk of email phishing: Proofpoint

22 February, 2024 by Dylan Bushell-Embling | Supplied by: Proofpoint Inc.

Analysis from Proofpoint found that only 18% of Australian universities have implemented the recommended highest level of DMARC email protection.


Tesserent Academy secures ISACA training accreditation

21 February, 2024 by Dylan Bushell-Embling

Tesserent Academy and ALC Training have been classified as accredited cybersecurity training organisations by IT governance professional association ISACA.


myGov takes a stand on passwords

14 February, 2024 by Geoff Schomburgk, Vice President of Asia Pacific & Japan,Yubico | Supplied by: Yubico Inc

What myGov's move to passwordless authentication means for public sector organisations.


Motorola Solutions taps Google Cloud for public safety

14 February, 2024 by Dylan Bushell-Embling | Supplied by: Motorola Solutions

Motorola Solutions has arranged to use Google Cloud infrastructure to support its suite of enterprise and public safety solutions.


How Australia can defend against AI-generated cyber attacks

07 February, 2024 by Steven Hocking, Senior Partner – Advisory, Tesserent | Supplied by: Tesserent Australia Pty Ltd

As criminals start using AI and other emerging technology, a well-conceived and executed defensive cybersecurity strategy will continue to thwart most attacks.


AI-based deepfakes to undermine face biometrics: Gartner

06 February, 2024 by Dylan Bushell-Embling

Gartner is warning that the prevalence of AI-generated deepfakes will prompt many companies to no longer consider face biometrics to be reliable in isolation.


Okta completes IRAP assessment

05 February, 2024 by Dylan Bushell-Embling

Identity management company Okta has completed an IRAP assessment certifying its use for managing government data up to the Protected level.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd