As per ACSC, in the 2021-22 financial year (FY22), they have received over 76,000 cybercrime reports. That is one report every seven minutes (or over 200 reported cyber incidents every day).
Australian security teams must exercise caution when relying on legacy protection methods like antiviruses. A modern...
In FY22 about 447 Ransomware incidents were reported in Australia. According to ACSC though they were less than last year the attacks were ‘significantly underreported’, especially by victims who pay the ransom.
Automation with AI and Machine Learning, helps security teams to detect and remediate sophisticated...
Juniper Networks has debuted security service edge capabilities that help clients consistently apply zero trust policies in the cloud regardless of the user or device. Juniper takes the policies customers already use within their network and converts them to cloud-delivered policies with one click.
Valuations are down, some companies have left the market altogether, and some even have announced deep rounds of layoffs. Yet, Alberto Yépez of Forgepoint Capital retains optimism for the cybersecurity marketplace in 2023 and says now is the ideal time to be ramping up investments in innovation.
In this episode of "Cybersecurity Unplugged," Chris "Tito" Sestito discusses technology to protect neural networks and artificial intelligence and machine-learning models, and John Kindervag explains how such technology fits into the zero trust framework.
If you had to secure a legion of workers in a short timeframe, could you do it? Hitachi did with Duo delivering MFA and zero trust, and Cisco Umbrella blocking threats. Read our customer success story on how Hitachi fortified its workforce
In the Security Outcomes Report, Volume 3: Achieving Security Resilience, Cisco Secure explores seven data-backed success factors organizations can implement to boost cyber resilience.
By analyzing data collected from over 4,700 security professionals across 26 countries, we set out to identify the vital...
The need to implement zero trust at scale is growing ever more critical. In this video interview with Information Security Media Group, subject matter experts Srinivas Tummalapenta of IBM and Justin Douglas of Palo Alto discuss the guiding principles of scaling zero trust.
As governments grapple with persistent worker and skillset shortages, contractors have become essential for getting the work of government done. To do that work, contractors often require secure access to agency applications, processes and data. However, critical systems and confidential data typically reside in both...
Appgate has promoted CISO and Federal President Leo Taddeo to CEO and tasked him with capturing zero trust deployment opportunities with the U.S. Defense Department. Appgate has tapped Taddeo to help the Defense Department grant access to users based on context as part of a new zero trust strategy.
The embrace of the open internet as the new corporate network has created challenges around remote access and employee security, says Perimeter 81 CEO Amit Bareket. Perimeter 81 has attempted to simplify securing remote work by bringing ZTNA and SWG together on a single management console.
How can successful organizations prepare for a possible recession? Most look for ways to reduce costs. Despite inflation and uncertainty, however, organizations aren't slowing their spend on security. Surprising? Maybe not. Savvy executives now see remote work as a cost-savings opportunity, and they're taking...
A carefully honed zero trust approach can allow healthcare entities to reduce pushback from clinicians while still "raising barriers appropriately" to prevent security incidents, says Dr. Eric Liederman, director of medical informatics and national privacy and security leader at Kaiser Permanente.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.