Adapting to new cybersecurity challenges: a roadmap for Australian government agencies
25 March, 2024 by Nam Lam*Given the rise in cyber threats against government networks and critical infrastructure sectors, a modern identity security strategy is crucial to protect classified data.
Growing fraud trends in Australian health care
20 March, 2024 by Jayesh Kapitan and Roger Darvall-Stevens*As the healthcare landscape evolves, so do the methods of fraud.
23% of connected healthcare devices vulnerable to attack
13 March, 2024 by Dylan Bushell-EmblingNew research from Claroty indicates that a high proportion of medical devices connected to hospital and other healthcare networks are inadequately secured.
Overcoming the top cybersecurity challenges faced by public agencies
13 March, 2024 by Martyn Beal*With a new cybersecurity strategy out and the right approach to key challenges, the public sector can improve its cyber stance.
EKA CyberLock: securing critical infrastructure in a connected world
12 March, 2024EKA CyberLock combines the attributes of a proximity card access control system with those of a mechanical master key system.
Dynatrace completes IRAP assessment
06 March, 2024 by Dylan Bushell-EmblingObservability and application security company Dynatrace has been certified to manage Australian Government data up to the Protected classification level.
Ten steps to improving IT security in the public sector
04 March, 2024 by Les Williamson, Regional Director Australia and New Zealand, Check Point Software TechnologiesBest practice suggests that there are 10 key steps public-sector organisations can undertake that will significantly improve their overall level of IT security.
GCSB updates NZ Information Security Manual
04 March, 2024 by Dylan Bushell-EmblingNew Zealand's Government Communications Security Bureau has published some minor updates to the New Zealand Information Security Manual.
China-linked attackers exploiting trusted relationships
28 February, 2024 by Dylan Bushell-EmblingA new report from CrowdStrike finds that China-nexus adversaries are increasingly exploiting trusted third-party relationships to compromise their targets.
82% of unis at high risk of email phishing: Proofpoint
22 February, 2024 by Dylan Bushell-EmblingAnalysis from Proofpoint found that only 18% of Australian universities have implemented the recommended highest level of DMARC email protection.
Tesserent Academy secures ISACA training accreditation
21 February, 2024 by Dylan Bushell-EmblingTesserent Academy and ALC Training have been classified as accredited cybersecurity training organisations by IT governance professional association ISACA.
myGov takes a stand on passwords
14 February, 2024 by Geoff Schomburgk, Vice President of Asia Pacific & Japan,YubicoWhat myGov's move to passwordless authentication means for public sector organisations.
Motorola Solutions taps Google Cloud for public safety
14 February, 2024 by Dylan Bushell-EmblingMotorola Solutions has arranged to use Google Cloud infrastructure to support its suite of enterprise and public safety solutions.
How Australia can defend against AI-generated cyber attacks
07 February, 2024 by Steven Hocking, Senior Partner – Advisory, TesserentAs criminals start using AI and other emerging technology, a well-conceived and executed defensive cybersecurity strategy will continue to thwart most attacks.
AI-based deepfakes to undermine face biometrics: Gartner
06 February, 2024 by Dylan Bushell-EmblingGartner is warning that the prevalence of AI-generated deepfakes will prompt many companies to no longer consider face biometrics to be reliable in isolation.