By Kate Healy, Principal Cyber Strategist Every day in offices across the globe, employees swiftly clear out their email inboxes,…
Just one in five Australian IT professionals are certain they have not experienced a Pass the Hash attack Survey of…
NIST invites comments on Draft Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This…
As cybercriminals continue to become more sophisticated and prolific, one of the key weapons in their arsenal is automation, letting…
New solution helps organizations improve security posture and mitigate risk proactively SolarWinds (NYSE:SWI), has announced the launch of SolarWinds® Identity Monitor. The solution…
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0…
New Threat Hunting, Detection and Response Offering Sophos (LSE: SOPH), has announced the availability of Sophos Managed Threat Response (MTR), a fully managed…
2019 Mid-year OverWatch report provides insights into massive uptick in eCrime cyber activity; retail comes back as one of the…
Industry’s first-ever fixed cost licensing model means businesses don’t have to sacrifice security because of cost unpredictability LogRhythm has released…
Tabled in parliament, 1 October 2019. This report contains recommendations and advice for all public sector entities and local governments.…