Featured posts

The NSW Government is taking an integrated approach to preventing and responding to cyber security threats across the state, to…

NIST Requests Public Comments on Draft NISTIR 8228 NIST has released Draft NIST Internal Report (NISTIR) 8228, Considerations for Managing…


The proliferation of wireless and bring your own device (BYOD) endpoints means corporate networks depend more on wireless networks. Securing…



NIST Requests Comments on Draft NISTIR 8221, “A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks” NIST has…


Where are the hordes of cold and scary European privacy policy enforcers? Can you see them slowly roaming and moaning…


Digital Transformation Barometer finds better security needed to harness the positive potential of AI and mitigate risks of malicious attacks…


Neustar has announced the launch of its new internet traffic scrubbing centre in Sydney. With the expansion across the APAC region,…


Blockchain, best known as the technology that underpins cryptocurrencies such as Bitcoin, is set to redefine cybersecurity as it inevitably…


The number of vulnerabilities reported in 2018 is 21% higher than last year, and total bug bounty payouts has increased…


WatchGuard’s Q2 2018 Internet Security Report uncovers cybercriminals’ heightened use of credential-focused attacks, the continued prevalence of malicious Office documents,…