Telstra sees stark reality of cyber threats

Telco details transformation and digitalisation at AGM The world is going through a period of upheaval, with changes in the geopolitical landscape, supply chain disruptions, and economic pressures such as inflation coming on top of the growing impacts of climate change, stated Vicki Brady, CEO of Telstra at the telco recent annual…

Read More

Companies with compromised cybersecurity at risk of losing customers

The recent attack on Optus will have implications that we are yet to realise ISACA has released the results of its inaugural consumer cybersecurity research study, which shows that one in three consumer households in Australia have had their personal information stolen by cyber criminals, leading to a growing sense of hopelessness…

Read More

DevSecOps is the most transformative digitization challenge yet

Moving apps into production represents the most complex phase of app modernization Enterprises face their most transformative challenge to date: implementing a DevSecOps methodology. However, technical, and cultural barriers continue to block the path to unify developer and IT ops teams. A recent peak in high-profile cybersecurity threats (including Log4j)…

Read More

HK enhances capability in responding to cyber threats

Assistant Government Chief Information Officer provides insight As stated in the Hong Kong Smart City Blueprint, the mission of the Hong Kong Government in respect of cyber security is to “enhance the Government’s cyber security capability to address new security risks and facilitate collaboration among stakeholders to promote awareness and…

Read More

21 per cent of HTML attachments found to be malicious

HTML attachments are not scanned by anti-spam nor anti-virus solutions. Businesses in Asia-Pacific could find themselves vulnerable to attack via HTML attachment, with 21 per cent of all HTML attachments analysed found to be malicious – according to Barracuda, a trusted partner and leading provider of cloud-first security solutions. Having…

Read More

Cyber actors exploit network providers and devices

This joint Cybersecurity Advisory was coauthored by the NSA. Summary This joint Cybersecurity Advisory describes the ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities to establish a broad network of compromised infrastructure. These actors use the network to exploit a wide…

Read More

Global industrial cybersecurity spend to grow

ABI Research’s new whitepaper presents critical and actionable cybersecurity trends and forecasts. Global cybersecurity spending in industrial critical infrastructure sectors (e.g., energy, transport, and water & waste management) is expected to hit $US23 billion by the end of 2022 and grow at a CAGR of 10 per cent to reach $US36.67 billion in 2027. This…

Read More

Russian state-sponsored and criminal cyber threats

Cybercrime groups have threatened to conduct cyber operations. Evolving intelligence indicates that the Russian government is exploring options for potential cyberattacks. Recent Russian state-sponsored cyber operations have included distributed denial-of-service (DDoS) attacks, and older operations have included deployment of destructive malware against Ukrainian government and critical infrastructure organizations. Additionally, some cybercrime groups…

Read More