The Australian Cyber Security Centre (ACSC) responded to 2,266 cyber security incidents at a rate of almost six per day from July 2019 to June 2020. These attacks not only disrupt the businesses but translate to costing the economy up to $29 billion per year which is 1.9% of Australia’s gross domestic product (GDP)....
The Australian Cyber Security Centre's (ACSC) inaugural cyber threat shows it responded to 2,266 cyber security incidents in 2019-20. Operating in a world, where pandemic has affected everything is challenging. This is especially true for industries like legal services where there is wealth of confidential data.
...
Manufacturing industry is a valuable target for cyber criminals as it has a plethora of data related to customer private data, financial information, intellectual property etc. The Australian manufacturing sector has seen nearly a threefold increase in the numbers of cyberattacks since the start of COVID-19.
Read...
Automation is essential to ensuring the security and success of any cloud migration, from the most basic to the most complex. This is the case made by Josh Zelonis of Palo Alto Networks and Dr. Anton Chuvakin of Chronicle Security. They discuss the value and benefits in this interview.
With the adoption of hybrid cloud and the rise in
remote work, traditional connectivity models like
VPN and MPLS are no longer meeting performance
and security requirements. Distributed employees
need reliable access to their apps, yet disparate
networking and security infrastructure makes it
hard for IT to meet...
As cloud threats continue to rise, understanding an adversary's tactics, techniques and procedures (TTPs) is critical to strengthening cloud security. How can you pull together a unified and simple approach to speed up detection and response for your SOC team?
In this session, we will:
Dive into a comprehensive...
Today’s enterprises continue to move to the cloud and leverage cloud native architectures, such as containers and Kubernetes®, for scaling their business applications and achieving greater market efficiencies. At the same time, with these new architectures and environments come security challenges that...
To understand the global impact of COVID-19 on the security posture of organizations, the Unit 42 cloud threat intelligence team analyzed data from hundreds of cloud accounts around the world between October 2019 and February 2021 (before and after the onset of the pandemic).
This report details the scope of...
Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platforms (CWPP) are foundations for good cloud security, but with more and more organizations adopting microservices and Kubernetes orchestration using cloud and hybrid cloud infrastructure, they are unwittingly expanding their significant attack...
Enterprises on a Kubernetes journey cannot apply the traditional security solutions that once protected on-site servers or VMs, as those are not designed for the unique development practices and distributed environments with which Kubernetes excels. Enterprises must expand their existing security programs to cover the...
DevOps and the continuous integration/continuous deployment (CI/CD) pipeline are revolutionizing application development, test, and cloud delivery, enabling developers to write the application code and define the cloud infrastructure. But where is cloud security?
Shifting left allows cloud security to scale...
Based on Forrester Consulting’s new 2020 State of SOAR Report, 93% of SecOps teams say they’ll be making a priority of increasing automation in their incident response processes in the coming years.
Attacks are definitely on the rise. In fact, 79% of the businesses surveyed had experienced a breach in the past...
A compromised identity and its associated shared accounts are the single most
effective attack vector for a threat actor to compromise an entire multicloud
environment.
Download this whitepaper to learn how to protect your entire cloud environment, including:
Restricting the privileges any user, application,...
With the only integrated CASB that automatically keeps pace with the SaaS explosion
The introduction of the cloud brings many benefits to companies, from collaboration to cost savings. But with so many SaaS applications being used, companies face many security risks, from shadow IT to data protection to compliance...
Disrupt the Network Security Status Quo
Nonstop malware variants delivered by attackers using automation...
Increasing complexity introduced by public and hybrid cloud adoption...
New cybersecurity risks due to the explosion of IoT devices...
With so many fundamental changes and challenges in today’s IT...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.