Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Security

Dynatrace bolsters real-time visibility and vulnerability across entire application stack

Dynatrace bolsters real-time visibility and vulnerability across entire application stack

To detect and protect against vulnerabilities in runtime environments, Dynatrace has extended its application security ...

Wed, 17 Aug 2022
The threat of supply chain attacks and what you can do to prevent one

The threat of supply chain attacks and what you can do to prevent one

Addressing the possibility of “supply chain attacks” by malicious actors is an important step in protecting your ...

Ajay Unni Wed, 17 Aug 2022
Severe cyber security skills shortage in Australia puts strain on stretched security professionals

Severe cyber security skills shortage in Australia puts strain on stretched security professionals

Opinion: With Australian industries facing a cyber security skills shortage, businesses must turn to upskilling their ...

Geoff Schomburgk Wed, 17 Aug 2022
North Korean state-backed hackers linked to Maui ransomware activity

North Korean state-backed hackers linked to Maui ransomware activity

North Korean state-sponsored hacking group “Andariel” has been linked to the Maui ransomware operation that has been ...

Tue, 16 Aug 2022
SpaceX offers $25k bug bounty for white hats to hack Starlink

SpaceX offers $25k bug bounty for white hats to hack Starlink

SpaceX has invited responsible researchers, aka “white hats”, to hack into its satellite internet network Starlink, ...

Tue, 16 Aug 2022
CyRise to run NSW government’s cyber security accelerator program

CyRise to run NSW government’s cyber security accelerator program

CyRise, the nation’s only dedicated cyber security accelerator has been selected to operate the NSW government’s $1 ...

Tue, 16 Aug 2022
Secure State granted CMMC authorisation

Secure State granted CMMC authorisation

The South Australian cyber security company has become the first international organisation to secure permission from ...

Tue, 16 Aug 2022
Choosing between in-house and outsourced IT security

Choosing between in-house and outsourced IT security

With the importance of having robust IT security measures growing by the day, an increasing number of organisations are ...

Anthony Daniel Tue, 16 Aug 2022
Wesfarmers to bolster cyber security posture with new ‘cyber fusion centre’

Wesfarmers to bolster cyber security posture with new ‘cyber fusion centre’

Wesfarmers is setting up their new “cyber fusion centre” that is designed to serve the company’s retail and industrial ...

Mon, 15 Aug 2022
WA-based Barrett Communications acquired by Motorola Solutions

WA-based Barrett Communications acquired by Motorola Solutions

Based in Perth, Barrett Communications provides high and very high frequency radio equipment used by civil society, ...

Mon, 15 Aug 2022
Federal Court orders Google LLC to pay $60m for misleading data collection

Federal Court orders Google LLC to pay $60m for misleading data collection

Following court action by the ACCC, Google LLC has been ordered to pay $60 million in penalties by the Federal Court for ...

Mon, 15 Aug 2022
Cyber criminals bolstering phishing campaigns with spoof social media sites

Cyber criminals bolstering phishing campaigns with spoof social media sites

Norton Labs has found nearly three-quarters of phishing sites imitating Facebook following a year-long analysis.

Mon, 15 Aug 2022
Cyber attackers continue to double down on targeting ANZ education sector

Cyber attackers continue to double down on targeting ANZ education sector

According to a new report by Check Point Research, the ANZ education sector is experiencing more than double monthly ...

Fri, 12 Aug 2022