Featured posts
NIST Requests Comments on Draft NISTIR 8221, “A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks” NIST has…
Where are the hordes of cold and scary European privacy policy enforcers? Can you see them slowly roaming and moaning…
Digital Transformation Barometer finds better security needed to harness the positive potential of AI and mitigate risks of malicious attacks…
Neustar has announced the launch of its new internet traffic scrubbing centre in Sydney. With the expansion across the APAC region,…
Blockchain, best known as the technology that underpins cryptocurrencies such as Bitcoin, is set to redefine cybersecurity as it inevitably…
The number of vulnerabilities reported in 2018 is 21% higher than last year, and total bug bounty payouts has increased…
WatchGuard’s Q2 2018 Internet Security Report uncovers cybercriminals’ heightened use of credential-focused attacks, the continued prevalence of malicious Office documents,…
Australia’s only venture accelerator for cyber security startups, CyRise, is open for applications from potential founders looking to build globally-focussed cyber…
Recent research by Palo Alto Networks Unit 42 Email Link Analysis (ELINK) has revealed that between April – June 2018,…
Those who share or threaten to share intimate images of Australians without their consent may now face civil and criminal…