CISOs in Australia Urged to Take a Closer Look at Data Breach Risks

A leading cyber lawyer in Australia has warned CISOs and other IT leaders their organisations and careers could be at stake if they do not understand data risk and data governance practices.

By |2024-05-24T13:00:22+00:00May 24, 2024|Australia, Big Data, clayton utz, data breach, data governance, data security, International, privacy awareness week australia, Security, Uncategorized|Comments Off on CISOs in Australia Urged to Take a Closer Look at Data Breach Risks

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

Risky cyber security behaviours are putting employees at risk of phishing and other attacks, according to Proofpoint research, with many employees still unclear security is their responsibility, too.

By |2024-03-20T15:05:59+00:00March 20, 2024|Australia, CXO, cybersecurity, data privacy, data security, data security culture, information security, information security culture, International, phishing, proofpoint, Security, state of the phish 2024, Uncategorized|Comments Off on Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

The US National Institute of Standards and Technology's framework defines federal policy, but it can be used by private enterprises, too. Here's what you need to know.

Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Read more about the commercial surveillance vendors threat and its ecosystem and learn how to protect from it.

By |2024-02-14T18:39:21+00:00February 14, 2024|Apple, commercial surveillance vendors, cybersecurity, data security, Google, International, mobile device security, Mobility, Security, security threat analysis, spyware, Uncategorized|Comments Off on Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Australian Organisations Struggling to Resolve Tensions Between Personalisation, Privacy

Australian organisations are so focused on preventing data breaches that they’re unaware that the concern of most of their customers has more to do with privacy.

By |2024-01-23T21:17:14+00:00January 23, 2024|Australia, Big Data, CXO, cyber security, cybersecurity, data governance, Data Management, data security, government regulation, International, personalisation, regulation, Security, Uncategorized|Comments Off on Australian Organisations Struggling to Resolve Tensions Between Personalisation, Privacy

Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

The success of Australia’s six-shield cybersecurity strategy could depend on how well the nation manages the vast pools of data that will underpin the identification and mitigation of cyberthreats.

By |2023-11-02T18:45:16+00:00November 2, 2023|Australia, Big Data, cyber security, cyber security australia, cyber security strategy, cybersecurity, cybersecurity strategy, data governance, Data Management, data science, data science best practices, data security, International, Security, tenable, Uncategorized|Comments Off on Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Microsoft exposes Octo Tempest, an English-speaking threat actor that runs extortion, encryption and destruction campaigns at a wide variety of industries. Protect your company from Octo Tempest with these tips.

By |2023-10-30T15:31:28+00:00October 30, 2023|cybersecurity, data security, International, Microsoft, ransomware, Security, social engineering, Software, Uncategorized|Comments Off on Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Understand the Basics of Data Governance in E-Commerce

Data governance is necessary in e-commerce as it ensures that decisions are based on quality data while simultaneously managing risk and upholding compliance standards.

By |2023-10-12T14:02:36+00:00October 12, 2023|Big Data, Data Centers, data governance, data governance software, data governance tools, Data Management, data privacy, data quality, data security, E-Commerce, ecommerce, governance, Software, Uncategorized|Comments Off on Understand the Basics of Data Governance in E-Commerce

Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data

These open directories could leak sensitive data, intellectual property or technical data and let an attacker compromise the entire system. Follow these security best practices for open directories.

By |2023-09-29T10:34:13+00:00September 29, 2023|Big Data, cybersecurity, data security, Hardware, Networking, Security, security administration, security threats, Uncategorized, web hosting, web servers|Comments Off on Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data
Go to Top