Kaspersky Lab researchers monitoring the various clusters of the long standing, Russian-speaking threat actor, Turla (also known as Snake or…

10 Cyber Security Smart Home Tips from Ben-Gurion University From laptop computers to off-the-shelf devices, the cyber vulnerabilities keep multiplying…

This interview with Dr. Keyun Ruan dives into her research in identifying the value of ‘cyber’ in business, establishing traceability…

Machine learning (ML), usually oversold as artificial intelligence (AI), presents a double-edged sword for businesses, because, while it provides cybersecurity…

Australian consumers are largely unaware that new smart speaker technology can leave them open to having personal information accessed by…

Cybercrime and cyber-enabled crime is harming more and more Australians every day. It’s time to reverse the threat. ‘One in…

Local research from Aruba and Ponemon Institute Shows Security Teams View Machine Learning and Network Visibility for Users and IoT…

75% of organisations lack complete confidence that their security defenses will stop targeted spear-phishing with malicious web links Mimecast has announced…

NIST has announced the final public draft Special Publication 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations–A System Life…

Call it alert fatigue. Call it information overload. Call it mind-killing and soul-destroying. The sheer number of alerts coming into…