3 Wynnstay Road, Prahran, 3181
+61 4 8461 3508

Blog

Social Media Marketing Agency

10 IoT Security Incidents That Make You Feel Less Secure

Internet of Things (IoT) has become a primary target for cybercriminals. The repeated security incidents on IoT devices represent a rising trend for IoT attacks with a huge increase in IoT security breaches 2021. By Rudra Srinivas, Feature Writer, CISO MAG The proliferation of connected devices in consumer, enterprise, and healthcare organizations, and their internal vulnerabilities, have created a security blind spot where cybercriminals can launch a Zero-day attack to compromise devices like webcams, smart TV, …

Tax incentives could work against cyber threats, says Andy Penn – republished by DMG Social

Business leaders and cyber security experts have united in a call for new mechanisms, including a centralised pool of cyber talent and tax incentives to move data to the cloud, to tackle the “profound” level of malicious threats being faced daily and costing upwards of $33 billion a year collectively. “It’s unrealistic to keep increasing security budgets and hiring security people – this is not sustainable,” Mark Sayer, Accenture’s cyber defence lead, says. “We need …

There’s no code of ethics to govern digital forensics – and we need one – By John J SLoan

Let me begin with a disclaimer: I am neither a digital forensics practitioner nor do I play one on television. I am, however, a professor in, and former chair of, an academic department at a research university that houses a graduate program in computer (digital) forensics I helped design. In 2011, I cofounded a computer forensics research center at my university. Finally, for more than 10 years, I have taught undergraduate and graduate courses on professional ethics for criminal …

Microsoft Sharepoint and Microsoft Exchange – Security Vulnerabilities – Patch updates available

Alert status – HIGH Background /What has happened? Microsoft released multiple security updates to a range of products in its 12 October 2021 patch release. The ACSC recommends that all vulnerabilities identified in the release should be mitigated as outlined in the ACSC’s Assessing Security Vulnerabilities and Applying Patches. The vulnerabilities identified affect a wide range of Microsoft Office versions and other applications which handle Microsoft Office files. The ACSC wishes to draw particular attention to the following …

Why your organisation’s perimeter cybersecurity model is outdated

The case for identity and access management, according to Thales’ Rana Gupta. Australian organisations continue to increase spending on cyber security, yet serious security breaches continue. Part of the problem is the perimeter security model, argues Rana Gupta, Vice President, APAC, Authentication & Encryption for Thales’ Cloud Licencing & Protection division. Gupta speaks about the issue in a two-part podcast mini-series about zero-trust security (listen to episode 1 below), in which he suggests that a …