Security > Main

Adapting to new cybersecurity challenges: a roadmap for Australian government agencies

25 March, 2024 by Nam Lam*

Given the rise in cyber threats against government networks and critical infrastructure sectors, a modern identity security strategy is crucial to protect classified data.


Growing fraud trends in Australian health care

20 March, 2024 by Jayesh Kapitan and Roger Darvall-Stevens*

As the healthcare landscape evolves, so do the methods of fraud.


23% of connected healthcare devices vulnerable to attack

13 March, 2024 by Dylan Bushell-Embling

New research from Claroty indicates that a high proportion of medical devices connected to hospital and other healthcare networks are inadequately secured.


Overcoming the top cybersecurity challenges faced by public agencies

13 March, 2024 by Martyn Beal*

With a new cybersecurity strategy out and the right approach to key challenges, the public sector can improve its cyber stance.


EKA CyberLock: securing critical infrastructure in a connected world

12 March, 2024

EKA CyberLock combines the attributes of a proximity card access control system with those of a mechanical master key system.


Dynatrace completes IRAP assessment

06 March, 2024 by Dylan Bushell-Embling

Observability and application security company Dynatrace has been certified to manage Australian Government data up to the Protected classification level.


Ten steps to improving IT security in the public sector

04 March, 2024 by Les Williamson, Regional Director Australia and New Zealand, Check Point Software Technologies

Best practice suggests that there are 10 key steps public-sector organisations can undertake that will significantly improve their overall level of IT security.


GCSB updates NZ Information Security Manual

04 March, 2024 by Dylan Bushell-Embling

New Zealand's Government Communications Security Bureau has published some minor updates to the New Zealand Information Security Manual.


China-linked attackers exploiting trusted relationships

28 February, 2024 by Dylan Bushell-Embling

A new report from CrowdStrike finds that China-nexus adversaries are increasingly exploiting trusted third-party relationships to compromise their targets.


82% of unis at high risk of email phishing: Proofpoint

22 February, 2024 by Dylan Bushell-Embling

Analysis from Proofpoint found that only 18% of Australian universities have implemented the recommended highest level of DMARC email protection.


Tesserent Academy secures ISACA training accreditation

21 February, 2024 by Dylan Bushell-Embling

Tesserent Academy and ALC Training have been classified as accredited cybersecurity training organisations by IT governance professional association ISACA.


myGov takes a stand on passwords

14 February, 2024 by Geoff Schomburgk, Vice President of Asia Pacific & Japan,Yubico

What myGov's move to passwordless authentication means for public sector organisations.


Motorola Solutions taps Google Cloud for public safety

14 February, 2024 by Dylan Bushell-Embling

Motorola Solutions has arranged to use Google Cloud infrastructure to support its suite of enterprise and public safety solutions.


How Australia can defend against AI-generated cyber attacks

07 February, 2024 by Steven Hocking, Senior Partner – Advisory, Tesserent

As criminals start using AI and other emerging technology, a well-conceived and executed defensive cybersecurity strategy will continue to thwart most attacks.


AI-based deepfakes to undermine face biometrics: Gartner

06 February, 2024 by Dylan Bushell-Embling

Gartner is warning that the prevalence of AI-generated deepfakes will prompt many companies to no longer consider face biometrics to be reliable in isolation.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd