Growing fraud trends in Australian health care
20 March, 2024 by Jayesh Kapitan and Roger Darvall-Stevens* | Supplied by: RSM AustraliaAs the healthcare landscape evolves, so do the methods of fraud.
23% of connected healthcare devices vulnerable to attack
13 March, 2024 by Dylan Bushell-EmblingNew research from Claroty indicates that a high proportion of medical devices connected to hospital and other healthcare networks are inadequately secured.
Overcoming the top cybersecurity challenges faced by public agencies
13 March, 2024 by Martyn Beal* | Supplied by: Trend Micro Australia Pty LtdWith a new cybersecurity strategy out and the right approach to key challenges, the public sector can improve its cyber stance.
EKA CyberLock: securing critical infrastructure in a connected world
12 March, 2024 | Supplied by: EKA CyberlockEKA CyberLock combines the attributes of a proximity card access control system with those of a mechanical master key system.
Dynatrace completes IRAP assessment
06 March, 2024 by Dylan Bushell-EmblingObservability and application security company Dynatrace has been certified to manage Australian Government data up to the Protected classification level.
Ten steps to improving IT security in the public sector
04 March, 2024 by Les Williamson, Regional Director Australia and New Zealand, Check Point Software Technologies | Supplied by: Check Point Software Technologies LtdBest practice suggests that there are 10 key steps public-sector organisations can undertake that will significantly improve their overall level of IT security.
GCSB updates NZ Information Security Manual
04 March, 2024 by Dylan Bushell-EmblingNew Zealand's Government Communications Security Bureau has published some minor updates to the New Zealand Information Security Manual.
China-linked attackers exploiting trusted relationships
28 February, 2024 by Dylan Bushell-Embling | Supplied by: CrowdStrikeA new report from CrowdStrike finds that China-nexus adversaries are increasingly exploiting trusted third-party relationships to compromise their targets.
82% of unis at high risk of email phishing: Proofpoint
22 February, 2024 by Dylan Bushell-Embling | Supplied by: Proofpoint Inc.Analysis from Proofpoint found that only 18% of Australian universities have implemented the recommended highest level of DMARC email protection.
Tesserent Academy secures ISACA training accreditation
21 February, 2024 by Dylan Bushell-EmblingTesserent Academy and ALC Training have been classified as accredited cybersecurity training organisations by IT governance professional association ISACA.
myGov takes a stand on passwords
14 February, 2024 by Geoff Schomburgk, Vice President of Asia Pacific & Japan,Yubico | Supplied by: Yubico IncWhat myGov's move to passwordless authentication means for public sector organisations.
Motorola Solutions taps Google Cloud for public safety
14 February, 2024 by Dylan Bushell-Embling | Supplied by: Motorola SolutionsMotorola Solutions has arranged to use Google Cloud infrastructure to support its suite of enterprise and public safety solutions.
How Australia can defend against AI-generated cyber attacks
07 February, 2024 by Steven Hocking, Senior Partner – Advisory, Tesserent | Supplied by: Tesserent Australia Pty LtdAs criminals start using AI and other emerging technology, a well-conceived and executed defensive cybersecurity strategy will continue to thwart most attacks.
AI-based deepfakes to undermine face biometrics: Gartner
06 February, 2024 by Dylan Bushell-EmblingGartner is warning that the prevalence of AI-generated deepfakes will prompt many companies to no longer consider face biometrics to be reliable in isolation.
Okta completes IRAP assessment
05 February, 2024 by Dylan Bushell-EmblingIdentity management company Okta has completed an IRAP assessment certifying its use for managing government data up to the Protected level.