Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Security

Cloudian object storage and Microsoft SQL Server 2022 integrate

Cloudian object storage and Microsoft SQL Server 2022 integrate

Cloudian’s HyperStore object storage platform is now integrated to work with Microsoft SQL Server 2022, a relational ...

Thu, 26 May 2022
General Motors hit by cyber attack, car owners’ data leaked

General Motors hit by cyber attack, car owners’ data leaked

US car manufacturing giant General Motors (GM) was hit with a credential stuffing attack last month that prompted the ...

Thu, 26 May 2022
PODCAST: An uncertain world, with MAJGEN (Ret’d) Mick Ryan

PODCAST: An uncertain world, with MAJGEN (Ret’d) Mick Ryan

In this episode of the Cyber Security Uncut podcast, Major General (Ret’d) Mick Ryan joins hosts Major General (Ret’d) ...

Robyn Tongol Thu, 26 May 2022
How to treat cyber security as a business decision

How to treat cyber security as a business decision

We keep hearing about how boards now regard cyber security as a business risk, yet it’s often still treated as a problem ...

Richard Addiscott Thu, 26 May 2022
New malware specifically targeting industrial control systems identified

New malware specifically targeting industrial control systems identified

New malware developed to disrupt or destroy industrial processes is a threat to critical industries. Here’s what you can ...

Dragos Thu, 26 May 2022
A spotlight on scams at national Law Week 2022

A spotlight on scams at national Law Week 2022

With the ACSC categorising half the fallout of cyber security breaches “substantial” in impact, Shannon Fentiman, the ...

Wed, 25 May 2022
Data breach report reveals highest jump in ransomware attacks over 5 years

Data breach report reveals highest jump in ransomware attacks over 5 years

Ransomware threat continues to rise according to the Verizon 2022 Data Breach Investigations Report, which revealed that ...

Wed, 25 May 2022
Oracle bolsters cloud security capability via integrated threat management

Oracle bolsters cloud security capability via integrated threat management

Oracle is set to expand the built-in security services and capabilities of Oracle Cloud Infrastructure (OCI) with the ...

Wed, 25 May 2022
Distinguishing hype from reality: Why XDR is key to protecting against modern, sophisticated attacks

Distinguishing hype from reality: Why XDR is key to protecting against modern, sophisticated attacks

There has been a lot of talk about extended detection and response (XDR) with many interpretations leading to debate and ...

Fabio Fratucello Wed, 25 May 2022
Cyber Resilience – how to prepare for, respond to   quickly recover

Cyber Resilience – how to prepare for, respond to quickly recover

Are you prepared and resilient enough to be able to continue business operations when a cyber-attack occurs?

ALC Cyber Security Wed, 25 May 2022
PODCAST: The future of ICS/OT cyber security, with Dragos’ Conor McLaren

PODCAST: The future of ICS/OT cyber security, with Dragos’ Conor McLaren

In this special Cyber Resilience Week episode of the Cyber Security Uncut podcast, senior threat intelligence analyst at ...

Robyn Tongol Tue, 24 May 2022
Providing an advantage for ransomware preparedness and recovery

Providing an advantage for ransomware preparedness and recovery

A ransomware attack can cripple an organisation in minutes, leaving it incapable of accessing critical data and unable ...

Absolute Software Tue, 24 May 2022
New research reveals uptick in Trojan cyber attacks impacting SMEs

New research reveals uptick in Trojan cyber attacks impacting SMEs

Kaspersky data has revealed that the average loss from a single cyber attack has exploded from $34,000 to just under ...

Mon, 23 May 2022