APP-ACSM | End-Point Security | Network Security | Strategy & Architecture | February 23, 2021 Vault Cloud signs partnership with Aruba to bolster its cloud security solutions for government and critical industries Aruba has announced a strategic technology partnership with Vault Cloud to leverage Aruba ClearPass for network access control. As the… Read More APP-ACSM | Network Security | Strategy & Architecture | February 23, 2021 Macquarie Telecom commences SD-LAN service Macquarie Telecom, part of Macquarie Telecom Group (ASX: MAQ), has commenced offering a SD-LAN service. SD-LAN – software-defined local area… Read More APP-ACSM | Cyber Security | Strategy & Architecture | February 19, 2021 Security versus agility: how do we achieve the best of both worlds? By Lindsay Morgan, ANZ Director, Government Security at SAP If 2020 taught us anything, it’s that the weakest link often… Read More APP-ACSM | Cyber Security | Network Security | Strategy & Architecture | February 15, 2021 Secolve and LMNTRIX partner to combat OT attacks Secolve has expanded its capacity to protect Australian businesses’ OT networks against malicious cyber activity, today announcing a new partnership… Read More APP-ACSM | Network Security | Strategy & Architecture | February 9, 2021 Comment Period EXTENDED for Draft IoT Cybersecurity Guidance (SP 800-213 and NISTIRs 8259B/C/D) The comment period for the following four draft publications has been extended through Friday, February 26, 2021. Draft SP 800-213,… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 28, 2021 Cyber security taskforce releases priority recommendations Standards Australia has released its Recommendations Report of the NSW Cyber Security Standards Harmonisation Taskforce, which commenced in June last year… Read More APP-ACSM | Cyber Security | Information Security | Strategy & Architecture | January 20, 2021 Varonis announces new features to combat insider threats and collaboration risks in Microsoft 365 Varonis Systems, Inc. announces new features for the Varonis Data Security Platform. The enhancements will help organisations visualise and reduce… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 20, 2021 FireEye report re: UNC2452 remediation In December 2020, FireEye uncovered and disclosed publicly a widespread attacker campaign that is being tracked as UNC2452. In some,… Read More APP-ACSM | Cryptography & Encryption | Cyber Security | Information Security | Strategy & Architecture | January 18, 2021 Entrust Acquires HyTrust Entrust has acquired HyTrust, Inc.. By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud… Read More APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next
APP-ACSM | Network Security | Strategy & Architecture | February 23, 2021 Macquarie Telecom commences SD-LAN service Macquarie Telecom, part of Macquarie Telecom Group (ASX: MAQ), has commenced offering a SD-LAN service. SD-LAN – software-defined local area… Read More APP-ACSM | Cyber Security | Strategy & Architecture | February 19, 2021 Security versus agility: how do we achieve the best of both worlds? By Lindsay Morgan, ANZ Director, Government Security at SAP If 2020 taught us anything, it’s that the weakest link often… Read More APP-ACSM | Cyber Security | Network Security | Strategy & Architecture | February 15, 2021 Secolve and LMNTRIX partner to combat OT attacks Secolve has expanded its capacity to protect Australian businesses’ OT networks against malicious cyber activity, today announcing a new partnership… Read More APP-ACSM | Network Security | Strategy & Architecture | February 9, 2021 Comment Period EXTENDED for Draft IoT Cybersecurity Guidance (SP 800-213 and NISTIRs 8259B/C/D) The comment period for the following four draft publications has been extended through Friday, February 26, 2021. Draft SP 800-213,… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 28, 2021 Cyber security taskforce releases priority recommendations Standards Australia has released its Recommendations Report of the NSW Cyber Security Standards Harmonisation Taskforce, which commenced in June last year… Read More APP-ACSM | Cyber Security | Information Security | Strategy & Architecture | January 20, 2021 Varonis announces new features to combat insider threats and collaboration risks in Microsoft 365 Varonis Systems, Inc. announces new features for the Varonis Data Security Platform. The enhancements will help organisations visualise and reduce… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 20, 2021 FireEye report re: UNC2452 remediation In December 2020, FireEye uncovered and disclosed publicly a widespread attacker campaign that is being tracked as UNC2452. In some,… Read More APP-ACSM | Cryptography & Encryption | Cyber Security | Information Security | Strategy & Architecture | January 18, 2021 Entrust Acquires HyTrust Entrust has acquired HyTrust, Inc.. By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud… Read More APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next
APP-ACSM | Cyber Security | Strategy & Architecture | February 19, 2021 Security versus agility: how do we achieve the best of both worlds? By Lindsay Morgan, ANZ Director, Government Security at SAP If 2020 taught us anything, it’s that the weakest link often… Read More APP-ACSM | Cyber Security | Network Security | Strategy & Architecture | February 15, 2021 Secolve and LMNTRIX partner to combat OT attacks Secolve has expanded its capacity to protect Australian businesses’ OT networks against malicious cyber activity, today announcing a new partnership… Read More APP-ACSM | Network Security | Strategy & Architecture | February 9, 2021 Comment Period EXTENDED for Draft IoT Cybersecurity Guidance (SP 800-213 and NISTIRs 8259B/C/D) The comment period for the following four draft publications has been extended through Friday, February 26, 2021. Draft SP 800-213,… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 28, 2021 Cyber security taskforce releases priority recommendations Standards Australia has released its Recommendations Report of the NSW Cyber Security Standards Harmonisation Taskforce, which commenced in June last year… Read More APP-ACSM | Cyber Security | Information Security | Strategy & Architecture | January 20, 2021 Varonis announces new features to combat insider threats and collaboration risks in Microsoft 365 Varonis Systems, Inc. announces new features for the Varonis Data Security Platform. The enhancements will help organisations visualise and reduce… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 20, 2021 FireEye report re: UNC2452 remediation In December 2020, FireEye uncovered and disclosed publicly a widespread attacker campaign that is being tracked as UNC2452. In some,… Read More APP-ACSM | Cryptography & Encryption | Cyber Security | Information Security | Strategy & Architecture | January 18, 2021 Entrust Acquires HyTrust Entrust has acquired HyTrust, Inc.. By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud… Read More APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next
APP-ACSM | Cyber Security | Network Security | Strategy & Architecture | February 15, 2021 Secolve and LMNTRIX partner to combat OT attacks Secolve has expanded its capacity to protect Australian businesses’ OT networks against malicious cyber activity, today announcing a new partnership… Read More APP-ACSM | Network Security | Strategy & Architecture | February 9, 2021 Comment Period EXTENDED for Draft IoT Cybersecurity Guidance (SP 800-213 and NISTIRs 8259B/C/D) The comment period for the following four draft publications has been extended through Friday, February 26, 2021. Draft SP 800-213,… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 28, 2021 Cyber security taskforce releases priority recommendations Standards Australia has released its Recommendations Report of the NSW Cyber Security Standards Harmonisation Taskforce, which commenced in June last year… Read More APP-ACSM | Cyber Security | Information Security | Strategy & Architecture | January 20, 2021 Varonis announces new features to combat insider threats and collaboration risks in Microsoft 365 Varonis Systems, Inc. announces new features for the Varonis Data Security Platform. The enhancements will help organisations visualise and reduce… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 20, 2021 FireEye report re: UNC2452 remediation In December 2020, FireEye uncovered and disclosed publicly a widespread attacker campaign that is being tracked as UNC2452. In some,… Read More APP-ACSM | Cryptography & Encryption | Cyber Security | Information Security | Strategy & Architecture | January 18, 2021 Entrust Acquires HyTrust Entrust has acquired HyTrust, Inc.. By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud… Read More APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next
APP-ACSM | Network Security | Strategy & Architecture | February 9, 2021 Comment Period EXTENDED for Draft IoT Cybersecurity Guidance (SP 800-213 and NISTIRs 8259B/C/D) The comment period for the following four draft publications has been extended through Friday, February 26, 2021. Draft SP 800-213,… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 28, 2021 Cyber security taskforce releases priority recommendations Standards Australia has released its Recommendations Report of the NSW Cyber Security Standards Harmonisation Taskforce, which commenced in June last year… Read More APP-ACSM | Cyber Security | Information Security | Strategy & Architecture | January 20, 2021 Varonis announces new features to combat insider threats and collaboration risks in Microsoft 365 Varonis Systems, Inc. announces new features for the Varonis Data Security Platform. The enhancements will help organisations visualise and reduce… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 20, 2021 FireEye report re: UNC2452 remediation In December 2020, FireEye uncovered and disclosed publicly a widespread attacker campaign that is being tracked as UNC2452. In some,… Read More APP-ACSM | Cryptography & Encryption | Cyber Security | Information Security | Strategy & Architecture | January 18, 2021 Entrust Acquires HyTrust Entrust has acquired HyTrust, Inc.. By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud… Read More APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next
APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 28, 2021 Cyber security taskforce releases priority recommendations Standards Australia has released its Recommendations Report of the NSW Cyber Security Standards Harmonisation Taskforce, which commenced in June last year… Read More APP-ACSM | Cyber Security | Information Security | Strategy & Architecture | January 20, 2021 Varonis announces new features to combat insider threats and collaboration risks in Microsoft 365 Varonis Systems, Inc. announces new features for the Varonis Data Security Platform. The enhancements will help organisations visualise and reduce… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 20, 2021 FireEye report re: UNC2452 remediation In December 2020, FireEye uncovered and disclosed publicly a widespread attacker campaign that is being tracked as UNC2452. In some,… Read More APP-ACSM | Cryptography & Encryption | Cyber Security | Information Security | Strategy & Architecture | January 18, 2021 Entrust Acquires HyTrust Entrust has acquired HyTrust, Inc.. By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud… Read More APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next
APP-ACSM | Cyber Security | Information Security | Strategy & Architecture | January 20, 2021 Varonis announces new features to combat insider threats and collaboration risks in Microsoft 365 Varonis Systems, Inc. announces new features for the Varonis Data Security Platform. The enhancements will help organisations visualise and reduce… Read More APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 20, 2021 FireEye report re: UNC2452 remediation In December 2020, FireEye uncovered and disclosed publicly a widespread attacker campaign that is being tracked as UNC2452. In some,… Read More APP-ACSM | Cryptography & Encryption | Cyber Security | Information Security | Strategy & Architecture | January 18, 2021 Entrust Acquires HyTrust Entrust has acquired HyTrust, Inc.. By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud… Read More APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next
APP-ACSM | Cyber Security | Strategy & Architecture | White Papers & Research | January 20, 2021 FireEye report re: UNC2452 remediation In December 2020, FireEye uncovered and disclosed publicly a widespread attacker campaign that is being tracked as UNC2452. In some,… Read More APP-ACSM | Cryptography & Encryption | Cyber Security | Information Security | Strategy & Architecture | January 18, 2021 Entrust Acquires HyTrust Entrust has acquired HyTrust, Inc.. By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud… Read More APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next
APP-ACSM | Cryptography & Encryption | Cyber Security | Information Security | Strategy & Architecture | January 18, 2021 Entrust Acquires HyTrust Entrust has acquired HyTrust, Inc.. By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud… Read More APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next
APP-ACSM | Cyber Security | Hacking & Penetration Testing | Information Security | Strategy & Architecture | Vulnerabilities | January 18, 2021 How to avoid a data breach – Perimeter 81 discusses According to Perimeter 81, the largest hack in 2019 – committed by a former Amazon employee who stole data of… Read More 1 2 3 … 39 Next