Palo Alto Networks Unit 42 researchers have been tracking a group of attackers, which they are calling Gorgon Group. In…
In this interview, we discuss how Data Mining techniques and machine learning algorithms can be extremely useful when applied in covert channel detection and…
52% of businesses surveyed report loss of customer trust as the top consequence that would result from a breach Two…
Customers validate that FireEye’s unique threat intelligence and effective detection by FireEye technology and analysts creates a unique differentiator that…
More than 90 percent of global organisations reported the volume of phishing attacks have increased or stayed the same in…
In this interview we speak to Fergus Hanson, co-author with Tom Uren of the Australian Strategic Policy Institute’s (ASPI) Policy…
In this episode we are joined in Singapore by Ian Yip, APAC CTO at McAfee and discuss the impact of Singapore’s Cyber…
NIST seeks comments on Draft Special Publication (SP) 800-56B Revision 2, Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography. This…
Research from OpenText finds Australians are behind in AI, compared with Europe and North American counterparts Artificial intelligence (AI), associated…
NIST has published Special Publication (SP) 800-116 Revision 1, Guidelines for the Use of PIV Credentials in Facility Access. It…