Intercede launches MyID MFA 5.0

25 March, 2024 by Dylan Bushell-Embling

Intercede has introduced a range of enhancements to its MyID MFA multi-factor authentication security platform.

Adapting to new cybersecurity challenges: a roadmap for Australian government agencies

25 March, 2024 by Nam Lam* | Supplied by: SailPoint

Given the rise in cyber threats against government networks and critical infrastructure sectors, a modern identity security strategy is crucial to protect classified data.

Growing fraud trends in Australian health care

20 March, 2024 by Jayesh Kapitan and Roger Darvall-Stevens* | Supplied by: RSM Australia

As the healthcare landscape evolves, so do the methods of fraud.

Overcoming the top cybersecurity challenges faced by public agencies

13 March, 2024 by Martyn Beal* | Supplied by: Trend Micro Australia Pty Ltd

With a new cybersecurity strategy out and the right approach to key challenges, the public sector can improve its cyber stance.

23% of connected healthcare devices vulnerable to attack

13 March, 2024 by Dylan Bushell-Embling

New research from Claroty indicates that a high proportion of medical devices connected to hospital and other healthcare networks are inadequately secured.

EKA CyberLock: securing critical infrastructure in a connected world

12 March, 2024 | Supplied by: EKA Cyberlock

EKA CyberLock combines the attributes of a proximity card access control system with those of a mechanical master key system.

Dynatrace completes IRAP assessment

06 March, 2024 by Dylan Bushell-Embling

Observability and application security company Dynatrace has been certified to manage Australian Government data up to the Protected classification level.

GCSB updates NZ Information Security Manual

04 March, 2024 by Dylan Bushell-Embling

New Zealand's Government Communications Security Bureau has published some minor updates to the New Zealand Information Security Manual.

Ten steps to improving IT security in the public sector

04 March, 2024 by Les Williamson, Regional Director Australia and New Zealand, Check Point Software Technologies | Supplied by: Check Point Software Technologies Ltd

Best practice suggests that there are 10 key steps public-sector organisations can undertake that will significantly improve their overall level of IT security.

China-linked attackers exploiting trusted relationships

28 February, 2024 by Dylan Bushell-Embling | Supplied by: CrowdStrike

A new report from CrowdStrike finds that China-nexus adversaries are increasingly exploiting trusted third-party relationships to compromise their targets.

82% of unis at high risk of email phishing: Proofpoint

22 February, 2024 by Dylan Bushell-Embling | Supplied by: Proofpoint Inc.

Analysis from Proofpoint found that only 18% of Australian universities have implemented the recommended highest level of DMARC email protection.

Tesserent Academy secures ISACA training accreditation

21 February, 2024 by Dylan Bushell-Embling

Tesserent Academy and ALC Training have been classified as accredited cybersecurity training organisations by IT governance professional association ISACA.

Motorola Solutions taps Google Cloud for public safety

14 February, 2024 by Dylan Bushell-Embling | Supplied by: Motorola Solutions

Motorola Solutions has arranged to use Google Cloud infrastructure to support its suite of enterprise and public safety solutions.

myGov takes a stand on passwords

14 February, 2024 by Geoff Schomburgk, Vice President of Asia Pacific & Japan,Yubico | Supplied by: Yubico Inc

What myGov's move to passwordless authentication means for public sector organisations.

How Australia can defend against AI-generated cyber attacks

07 February, 2024 by Steven Hocking, Senior Partner – Advisory, Tesserent | Supplied by: Tesserent Australia Pty Ltd

As criminals start using AI and other emerging technology, a well-conceived and executed defensive cybersecurity strategy will continue to thwart most attacks.

  • All content Copyright © 2024 Westwick-Farrow Pty Ltd