Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Security

Okta authentication app hacked, enables malicious user access

Okta authentication app hacked, enables malicious user access

Permiso P0 Labs security researchers have tricked the Okta authentication app into giving a malicious user access to ...

Fri, 02 Sep 2022
PODCAST: Active defence in business and the latest cyber security trends

PODCAST: Active defence in business and the latest cyber security trends

In this episode of the Cyber Security Uncut podcast, hosts Major General (Ret’d) Marcus Thompson and Phil Tarrant unpack ...

Robyn Tongol Fri, 02 Sep 2022
Check Point Software to secure Intel Pathfinder RISC-V platform

Check Point Software to secure Intel Pathfinder RISC-V platform

Check Point Quantum IoT Protect is set to be made available within Intel’s new platform for IoT device developers – ...

Thu, 01 Sep 2022
Practical steps towards solving Australia’s cyber security skills shortage

Practical steps towards solving Australia’s cyber security skills shortage

With attention focusing on identifying ways to overcome Australia’s ongoing skills crisis, one factor is not in dispute: ...

Ben Waters Thu, 01 Sep 2022
Cyber panel ‘urgently’ needed: Ashurst

Cyber panel ‘urgently’ needed: Ashurst

Just as there is a statutory authority to resolve disputes during takeovers – the Australian Takeovers Panel – there is ...

Jerome Doraisamy Thu, 01 Sep 2022
UK telecoms face massive non-compliance fines under new cyber security rules

UK telecoms face massive non-compliance fines under new cyber security rules

The UK government will be imposing a new sweeping set of rules it will impose on broadband and mobile carriers to ...

Thu, 01 Sep 2022
Applications open for new round of Cyber Gap program

Applications open for new round of Cyber Gap program

Eligible university students have been invited to apply for the next round of the ADF’s Cyber Gap program.

Thu, 01 Sep 2022
Understanding the Benefits of Attribute-based Access Control (ABAC)

Understanding the Benefits of Attribute-based Access Control (ABAC)

Explore the advantages of adopting an ABAC security model for a more dynamic zero trust approach to access and data ...

archTIS Thu, 01 Sep 2022
Assistant minister for Defence launches new ICT strategy

Assistant minister for Defence launches new ICT strategy

The 2022 Defence Information and Communications Technology (ICT) Strategy and the Defence Cyber Security Strategy were ...

Wed, 31 Aug 2022
Cryptocurrency campaign infecting PCs via free software uncovered

Cryptocurrency campaign infecting PCs via free software uncovered

An active cryptocurrency mining campaign that imitates Google Translate and other free software to infect PCs has been ...

Wed, 31 Aug 2022
Westpac launches free cyber response playbook for SMEs

Westpac launches free cyber response playbook for SMEs

Today, Westpac launched its free Cyber Response Playbook to help counter the increase in cyber attacks after new ...

Wed, 31 Aug 2022
How dynamic authorisation can help fraud prevention

How dynamic authorisation can help fraud prevention

With large numbers of staff working from home for the foreseeable future, many organisations are realising they may need ...

Steve Dillon Wed, 31 Aug 2022
Expert insights reveal ‘not all cyber insurance policies are equal’

Expert insights reveal ‘not all cyber insurance policies are equal’

According to cyber security insurance experts at KordaMentha, cyber insurance coverage may be nowhere near as ...

Wed, 31 Aug 2022