The cyber security challenges in fintech and neobanking’s rise

The cyber security challenges in fintech and neobanking’s rise

The 2020s is set to see a rapid growth of fintech and neobanking offerings in Australia. Unquestionably, there are many positives to this trend, but there will also be an increase in cybersecurity challenges to accompany it. While accelerated collaboration and sandboxing between traditional businesses and fintechs will drive innovation and competitive advantage, the start-up culture that underwrites this progress will prioritise growth and enhance capabilities over cybersecurity. Unfortunately, this puts their clients, their companies,…

Read More

Preventing Ransomware Attacks on Industrial Networks

Preventing Ransomware Attacks on Industrial Networks

By Michael Yehoshua, VP Marketing, SCADAfence Ransomware Works That’s the simplest way to explain why incidents of ransomware attacks have been growing steadily for the past two years — with no end in sight. The number of ransomware attacks has jumped by 350 percent since 2018, the average ransom payment increased by more than 100 percent, downtime is up by 200 percent and the average cost per incident is on the rise, according to a…

Read More

Black Hat USA 2022: What you need to know | The State of Security

Black Hat USA 2022: What you need to know | The State of Security

Following a successful hybrid event in 2021 that saw more than 6,000 in-person, and more than 14,500 virtual attendees, Black Hat USA returns in 2022 to the Mandalay Bay Convention Centre in Las Vegas, Nevada. Now in its 25th year, this year’s event has three key components, each equally unmissable, namely these are Trainings, Briefings, and The Business Hall. Black Hat USA 2022 will open with four days of Trainings on the 6th of August,…

Read More

Cybersecurity in city government: An Interview with Shane McDaniel

Cybersecurity in city government: An Interview with Shane McDaniel

When most people speak of any city government, they often mention words like “Bureaucratic”,“Behind the times”, and “Slow.”  This is especially true when considering cybersecurity initiatives.  However, a small town in Texas is changing that view.  Seguin, Texas, which was once the smallest Texas city to have a full-time cybersecurity employee, was the only government entity to be named in the CSO50 2022 Awards. The CSO50 awards recognize security projects that demonstrate outstanding thought leadership…

Read More

LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities

LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities

As part of its encryption process, LockBit 3.0 appends the extension HLJkNskOq (Figure 3) and changes the icons of encrypted files to that of the aforementioned .ico file. Similarities to BlackMatter ransomware Researchers have pointed out that portions of LockBit 3.0’s code seem to be borrowed from the BlackMatter ransomware, hence the nickname LockBit Black. Likewise, we found similarities between BlackMatter and the new LockBit variant during our debugging of the LockBit 3.0 sample. From…

Read More

Australia’s IT leadership moves 2022

Australia’s IT leadership moves 2022

Digital transformation has continued to gain space across public and private sectors. As IT is the fuel for digitisation, enterprise technology leaders are increasingly being sought after by companies. CIO Australia consistently tracks the moves of IT leaders. Here’s an update on the moves of Australian IT leaders starting from June 2022. If you want to share your next move with us, please message our A/NZ editor. July 2022 Stuart Hildyard departs from LaTrobe University…

Read More

The Wireless Mine Site

The Wireless Mine Site

Trend Overview Wireless technology has been a critical part of every mine site for years. However, choosing which type of wireless has become more complex with the choices of Wifi, LTE, 5G, LoRaWAN, and multiple fixed wireless or mesh options. This document will position each of these technologies for their most valuable use cases so that you’re not frustrated by using the wrong tool for the job you have. Wifi Beginnings The wireless technology that…

Read More

The Wireless Refinery

The Wireless Refinery

Trend Overview Wireless technology has been a critical part of every refinery for years. However, choosing which type of wireless system to deploy has become more complex with the choices of Wifi, LTE, WiHart, ISA100 and multiple fixed wireless or mesh options. This document will position each of these technologies for their most valuable use cases so that you’re not frustrated by using the wrong tool for the job you have. Wifi Beginnings The wireless…

Read More

Welcome To the Datagovops Revolution

Welcome To the Datagovops Revolution

By Ani Chaudhuri, CEO, Dasera Sales have SalesOps. Marketing has MarketingOps. Engineering and Security have DevOps, DevSecOps, and SecOps. It’s high time for Data Governance to have DataGovOps. Revisiting Data Governance First, let’s make sure everyone’s on the same page with respect to Data Governance.  According to Google Cloud, Data Governance is (with added emphasis): …everything you do to ensure data is secure, private, accurate, available, and usable. It includes the actions people must take,…

Read More
1 2,823 2,824 2,825 2,826 2,827 4,082