Featured posts
We are excited to announce that the final version of National Institute of Standards and Technology (NIST) Special Publication 1800-8, Securing…
Results indicate that security and sovereignty trump functionality when it comes to storing data in the cloud Over 38 percent…
Cybercriminals are targeting mobile phone users by tricking them into downloading fake online banking apps. Mobile users who mistakenly download…
Israeli technology company Security Matters is planning to list on the ASX via an initial public offering (IPO) on 13…
Cyber crime today is big business. Industry sources estimate it will cost the world a staggering US$6 trillion annually by…
The Cybersecurity Workforce Alliance helps develop the next generation of workforce ready Cyber Security Employees Three renowned Australian IT security…
Current endpoint protection solutions are failing causing organisations to pour money into remediation: the average global cost for remediating just…
Overview The second quarter of 2018 saw a continuation of trends we observed in the first quarter — increasingly diverse…
New ESET research reveals that the hype around the role of AI and ML plays in cybersecurity could be putting…
Palo Alto Networks Unit 42 researchers have been tracking a group of attackers, which they are calling Gorgon Group. In…