ESET researchers have reported a set of 10 previously undocumented malware families, implemented as malicious extensions for Internet Information Services…
Staff Writer The Australian Government has released the Defence Data Strategy 2021-2023. The strategy will guide data management and improve…
Cloud-native applications now consist of loosely coupled components (microservices), with all application services (e.g., authentication, authorization, load balancing, etc.) provided…
By Chris Fisher, Director of Security Engineering, Vectra APJ Ransomware attacks on critical infrastructure spike in last 3-6 months When…
In May 2021, NIST initiated a review of several publications, including the following NIST Special Publications (SP): SP 800 15, MISPC Minimum Interoperability…
Trend Micro’s new survey has calculated 69% of Australian organisations anticipate they are likely to experience a data breach that impacts customer data in the…
Qualys, Inc. has collaborated with Red Hat for both the container and host operating system for Red Hat OpenShift. Teaming with…
Elastic has released a free and open Limitless Extended Detection and Response (XDR) solution. Tony Katsabaris, AVP, Australia & New Zealand…
Staff Writer The Australian Government joined forces with two other countries last week and released a joint cybersecurity advisory. The…
Paul Haskell-Dowland, Associate Professor and Associate Dean (Computing and Security) at Edith Cowan University’s School of Science, said the recent Pegasus…