Australian IT Spending to Surge in 2025: Cybersecurity & AI Focus

Australian IT Spending to Surge in 2025: Cybersecurity & AI Focus

New Gartner forecasting suggests that IT spending in Australia will surge 8.7% to AU$147 billion in 2025. This boost in spending is projected to be driven by a “perfect storm” of interest in AI, ongoing requirements around cyber security, and the need to refresh hardware as Windows 10 goes out of service, Gartner representatives say. Strategic investments in cyber security and AI In an interview with TechRepublic, Andy Rowsell-Jones, Gartner distinguished VP analyst, said that…

Read More

Three Quarters of Dependency Vulnerability Patches Lead to Breakages, Report Finds

Three Quarters of Dependency Vulnerability Patches Lead to Breakages, Report Finds

Patches deployed for dependency vulnerabilities cause breakages 75% of the time, a new report has revealed. Minor updates were found to break clients 94% of the time, and for version upgrades this was 95%. Software dependencies — the external code or libraries that a project requires to function properly — are notoriously difficult to manage during application development. Remediating vulnerabilities in dependencies requires a major version update 24% of the time. “Seemingly the most straight-forward…

Read More

When Cyber Security Breaches Are Inevitable, It’s Time To Call For A New Approach

When Cyber Security Breaches Are Inevitable, It’s Time To Call For A New Approach

We need to do more than deflect cyberattacks: we need to build the capacity to sustain business … [+] operations during and after a cyberattack. getty At the TED Conference in Vancouver this year, our Radical Innovators foundation hosted a forum with more than 60 of the world’s top CHROs, CIOs, and founders. On the agenda: how new technologies like AI and quantum computing can elevate our human experience, transforming how we work and live…

Read More

Cyber Security and IT Leadership: A Growing Threat to Australia’s Renewable Energy Efforts

Cyber Security and IT Leadership: A Growing Threat to Australia’s Renewable Energy Efforts

Australia is on a mission to become a more energy-efficient nation. The Australian Renewable Energy Agency recently announced a $100 million initiative to explore and expand solar energy capabilities. Further investments in energy storage, pumped hydro, and low-carbon grids may prove just as significant. However, the nation must also address an underlying challenge: the integration of robust IT and software foundations within the OT environments that run the grids. Without these, Australia could struggle to…

Read More

Report Highlights Rising Risks in Sensitive Data Management

Report Highlights Rising Risks in Sensitive Data Management

The volume of sensitive data that companies are harbouring in non-production environments, like development, testing, analytics, and AI/ML, is rising, according to a new report. Executives are also getting more concerned about protecting it — and feeding it into new AI products is not helping. The “Delphix 2024 State of Data Compliance and Security Report” found that 74% of organisations that handle sensitive data increased the volume kept in non-production, also known as lower, environments…

Read More

Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study Finds

Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study Finds

Threat actors are taking advantage of when security professionals are off-duty to stage their ransomware attacks, new research has found. The ThreatDown 2024 State of Ransomware report from Malwarebytes has revealed most incidents in the last year occurred between 1 a.m. and 5 a.m. The report’s authors used data from the ThreatDown Managed Detection and Response team to conduct their research. It found that global ransomware attacks increased by 33% in the last year, with…

Read More

Tesserent Offers Mental Health Tips for Australian CISOs

Tesserent Offers Mental Health Tips for Australian CISOs

Cyber professionals in the APAC region are no strangers to work-related stress. Reports have indicated that most cyber workers in the region experience burnout, with as many as 9 in 10 employees impacted on some level. Causes of burnout include a lack of resources and alert fatigue, resulting in employee anxiety or disengagement. Senior executives at Australian cybersecurity firm Tesserent have offered some advice for CISOs who want to preserve their mental health in the…

Read More

Calling for backup: The importance of disaster recovery

Calling for backup: The importance of disaster recovery

These days, everyone knows the importance of backing up their data. Everything needs to be backed up — from a laptop to the cloud platform on which many businesses rely. It feels fairly simple.  Unfortunately, with bad actors finding new ways to attack businesses every day, nothing is ever that easy. Threat actors know good backups are the cheat code to not paying the ransomware, giving victims the ability to rewind the clock to before…

Read More

National Public Data Breach: 2.7bn Records Leaked on Dark Web

National Public Data Breach: 2.7bn Records Leaked on Dark Web

In August, a hacker dumped 2.7 billion data records, including social security numbers, on a dark web forum, in one of the biggest breaches in history. The data may have been stolen from background-checking service National Public Data at least four months ago. Each record has a person’s name, mailing address, and SSN, but some also contain other sensitive information, such as names of relatives, according to Bloomberg. How the data was stolen This breach…

Read More

Microsoft Azure Outage Caused by DDoS Attack

Microsoft Azure Outage Caused by DDoS Attack

Microsoft has confirmed the cause of the outage on July 30 was a distributed denial-of-service attack. However, its advisory added that the issue was exacerbated by an “error in the implementation of their defenses” during a mitigation attempt. The Azure cloud services were impacted between approximately 11:45 UTC and 19:43 UTC after being flooded by internet traffic. Redmond security pros say that the Azure Front Door and Azure Content Delivery Network components were “performing below…

Read More
1 2 3 4 5 129