As discussed in previous posts on our blog, securing building automation systems (BAS) has been an active area of research…

Vulnerabilities found would let threat actors start their own ‘battle royale’ against gamers Researchers at Check Point® Software Technologies has…

With all those post-Christmas smart-gadgets and connected devices lying around, make sure you keep you and your family’s data safe…

Crossword Cybersecurity plc review of nearly 1,200 global projects finds Cyber Physical Systems, Privacy, IoT and Cryptography are the strongest…

Company to license its technology for the development of secure IoT devices BlackBerry has announced it is scaling its BlackBerry…

NIST has published NIST Special Publication (SP) 800-37 Revision 2, Risk Management Framework for Information Systems and Organizations: A System Life…

The Australian Strategic Policy Institute (ASPI) has released a report, Perceptions survey: Industry views of the economic implications of the…

Comment Period Extended: Comments on Draft NISTIR 8196 are now due by February 6, 2019 (the original due date was…

According to F5’s latest 2018 Phishing and Fraud Report: Attacks Peak During the Holidays, fraud incidents during the months of…

The Australian Information Industry Association (AIIA) has announced seven new Board members and State Council Chairs from some of the…