cybersecurity

Image for Australia to investigate reports pilots trained Chinese military – ministerTop Stories

Australia to Investigate Reports Pilots Trained Chinese Military – Minister

Image for OutThink raises $10 million to tackle human errors behind data breachesTop Stories

OutThink Raises $10 Million to Tackle Human Errors Behind Data Breaches

Image for The security risks of M&A: What are the biggest pitfalls?Business

The Security Risks of M&a: What Are the Biggest Pitfalls?

Image for Breaches happen – here’s how CNI organisations can build resilience to cyber attacksTechnology

Breaches Happen – Here’s How Cni Organisations Can Build Resilience to Cyber Attacks

Image for How to outsmart increasingly complex cyber attacks

How to Outsmart Increasingly Complex Cyber Attacks

Date: October 14, 2022

By Leyton Jefferies, Head of Cyber Security Services at CSI Ltd Threat detection is harder today than it was two years ago. Next year will be harder than this year. Why? It’s a compounding effect from skills shortages and threat varieties that’s making it more challenging for any one product to handle key security...

Image for 5 Decisions to Make Now for a Successful Cyberattack Incident Response

5 Decisions to Make Now for a Successful Cyberattack Incident Response

Date: October 14, 2022

By Sean Deuby, Director of Services, Semperis Picture a great fortress built into a mountain pass. Within it are some of the most advanced defensive weaponry ever devised, an armory capable of bringing even the strongest army to heel. There’s just one problem: No one has bothered to establish a clear chain of command. When the fortress...

Image for Security for Privileged Access

Security for Privileged Access

Date: October 13, 2022

By Henry Harrison, Co-founder and Chief Scientist at Garrsion If you work in finance, healthcare, the energy business – or in any other regulated sector – you might want to turn your attention to what is currently going on in the telecoms industry, where the UK government is currently putting in place detailed cybersecurity regulations....

Image for Back to the boardroom: tips for a successful autumn reset

Back to the Boardroom: Tips for a Successful Autumn Reset

Date: October 13, 2022

By Guy Warren, CEO ITRS Group With autumn in the air and September resets required for many, the ‘back to school’ mentality is currently spreading further than the classroom. The next few months to year-end provide a natural time for organisations to revisit their business plans and set their minds to thinking about what they...

Image for Combatting Account Takeover Fraud – How to fine-tune your arsenal

Combatting Account Takeover Fraud – How to Fine-Tune Your Arsenal

Date: October 13, 2022

By Stuart Tarmy, Global Director, Financial Services Industry Solutions, Aerospike, Inc Account takeover fraud is one of the most dangerous types because a person actually gains access and takes over someone else’s banking, brokerage, credit card, or another critical financial account. The Q3 2022 Digital Trust & Safety Index by fraud prevention platform Sift revealed a 131% increase...

Image for What are DDoS attacks and what risks do they pose to the BFSI sector?

What Are DDoS Attacks and What Risks Do They Pose to the Bfsi Sector?

Date: October 11, 2022

By Mohit Bijlani, Head of UK&I at Cloudflare At a high level, a distributed Denial-of-Service (DDoS) attack is like an unexpected traffic jam clogging up the highway, preventing regular traffic from arriving at its destination. DDoS attacks can be divided into three categories: Application layer attacks that target the layer where web pages are generated...