Powered by MOMENTUMMEDIA
Breaking news and updates daily.
Subscribe to our Newsletter
Explore
SECTIONS
MORE
This is the second installment in a four-part blog series offering an in-depth breakdown of the four essential pillars of industrial cybersecurity: Reveal, Protect, ...
Claroty • Tue, 25 Mar 2025
Ping Identity acquires Singular Key
Ping Identity has acquired Singular Key, a specialist in no-code identity and security orchestration.
• Tue, 28 Sep 2021
Cyber attackers manipulating Google Forms: Sophos
Malicious cyber actors are exploiting the survey software to launch attacks against individuals and organisations, new research has revealed.
How 5G will change the future of smart cities in Australia
Smart cities are here, and they are getting smarter by the day with the support of 5G. Louise Hyland from AMTA explores.
Louise Hyland • Thu, 23 Sep 2021
COVID-induced cyber vulnerabilities to linger: Veritas
Ransomware risks exacerbated by COVID-induced digitisation could persist for the next few years, according to new research.
• Wed, 22 Sep 2021
Why attracting and retaining cyber specialists will be critical in the year ahead
As threat levels continue to rise, it’s vital to ensure you have an A Team in your corner, writes Glen Maloney from ExtraHop.
Glen Maloney • Fri, 17 Sep 2021
Bot attacks on the rise while human attacks stagnate: LexisNexis Cybercrime Report
LexisNexis Risk Solutions released its Cybercrime Report this week, examining the cyber security trends over 2021.
• Fri, 17 Sep 2021
How to build medal-winning data athletes
Geoffrey Coley from Veritas Technologies explains how organisations can inspire a “medal winning performance” from their data teams.
Geoffrey Coley • Fri, 17 Sep 2021
The great data ‘e-scrape’
Veteran cyber security advisor Eric Pinkerton explains how you can safeguard your personal data on social media platforms.
Eric Pinkerton • Wed, 15 Sep 2021
Ping Identity appoints new ANZ channel manager
A new channel manager has been appointed to spearhead the cyber security company’s operations across Australia and New Zealand.
• Wed, 08 Sep 2021
Countering the ‘careful attacker’
Sophistication is an overused expression when describing the aftermath of an attack – or at least, it was. Jim Cook from Attivo Networks explores.
Jim Cook • Fri, 03 Sep 2021
CISA, FBI team up to bolster cyber awareness
The federal agencies have agreed to collaborate to help drive the nation’s cyber security endeavour.
Charbel Kadib • Fri, 03 Sep 2021
Why insecure protocols should have no place in your IT infrastructure
Glen Maloney from ExtraHop flags risks associated with the use of insecure protocols in the heightened threat environment.
Glen Maloney • Fri, 03 Sep 2021