Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Security

Australian inaction keeps software supply chain security risks alive

Australian inaction keeps software supply chain security risks alive

The SolarWinds compromise exposed a security problem that just isn’t that easy to resolve, and we’re only now starting ...

Matias Madou Mon, 30 May 2022
Check Point hits global security prescribed Common Criteria certification

Check Point hits global security prescribed Common Criteria certification

Check Point Software Technologies Ltd has announced its successful completion of a new Common Criteria certification ...

Fri, 27 May 2022
WA bolsters cyber security posture with new strike team

WA bolsters cyber security posture with new strike team

The WA government is set to uplift their cyber security defences after the Essential Eight cyber security controls were ...

Fri, 27 May 2022
Mastercard launches Cyber Front attack simulation and assessment platform

Mastercard launches Cyber Front attack simulation and assessment platform

MasterCard has launched Cyber Front, a new attack simulation and assessment platform designed to bolster businesses and ...

Fri, 27 May 2022
A new perspective on the ultimate end point: Approaching security as a culture

A new perspective on the ultimate end point: Approaching security as a culture

Alex Nixon from Kroll advocates for a more considerate and nuanced approach to security as a culture, supported by an ...

Alex Nixon Fri, 27 May 2022
Australia, US, India and Japan lock in cyber security cooperative

Australia, US, India and Japan lock in cyber security cooperative

Allies Australia, Japan, US and India are set to work together on bolstering cyber security with initiatives aimed at ...

Thu, 26 May 2022
Cloudian object storage and Microsoft SQL Server 2022 integrate

Cloudian object storage and Microsoft SQL Server 2022 integrate

Cloudian’s HyperStore object storage platform is now integrated to work with Microsoft SQL Server 2022, a relational ...

Thu, 26 May 2022
General Motors hit by cyber attack, car owners’ data leaked

General Motors hit by cyber attack, car owners’ data leaked

US car manufacturing giant General Motors (GM) was hit with a credential stuffing attack last month that prompted the ...

Thu, 26 May 2022
PODCAST: An uncertain world, with MAJGEN (Ret’d) Mick Ryan

PODCAST: An uncertain world, with MAJGEN (Ret’d) Mick Ryan

In this episode of the Cyber Security Uncut podcast, Major General (Ret’d) Mick Ryan joins hosts Major General (Ret’d) ...

Robyn Tongol Thu, 26 May 2022
How to treat cyber security as a business decision

How to treat cyber security as a business decision

We keep hearing about how boards now regard cyber security as a business risk, yet it’s often still treated as a problem ...

Richard Addiscott Thu, 26 May 2022
New malware specifically targeting industrial control systems identified

New malware specifically targeting industrial control systems identified

New malware developed to disrupt or destroy industrial processes is a threat to critical industries. Here’s what you can ...

Dragos Thu, 26 May 2022
A spotlight on scams at national Law Week 2022

A spotlight on scams at national Law Week 2022

With the ACSC categorising half the fallout of cyber security breaches “substantial” in impact, Shannon Fentiman, the ...

Wed, 25 May 2022
Data breach report reveals highest jump in ransomware attacks over 5 years

Data breach report reveals highest jump in ransomware attacks over 5 years

Ransomware threat continues to rise according to the Verizon 2022 Data Breach Investigations Report, which revealed that ...

Wed, 25 May 2022