How Education Institution Technology Needs to Evolve

How Education Institution Technology Needs to Evolve

The 2023 Education Summit event – co-hosted by Cisco and CAUDIT – provided higher education technology leaders an opportunity to gain new insights and perspectives on some of the rapid technology innovation and developments that will continue to transform the sector. The summit also provided delegates with a chance to share their experiences and to engage with peers from the sector. While Australia’s higher education institutions have a major role to play in harnessing digital…

Read More

Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG

Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG

Almost overnight, Artificial Intelligence (AI) has become a priority for most organizations. A concerning trend is the increasing use of AI by adversaries to execute malicious activities. Sophisticated actors leverage AI to automate attacks, optimize breach strategies, and even mimic legitimate user behaviors, thereby escalating the complexity and scale of threats. This blog discusses how attackers might manipulate and compromise AI systems, highlighting potential vulnerabilities and the implications of such attacks on AI implementations. By…

Read More

How to Use Google's Titan Security Keys With Passkey Support

How to Use Google's Titan Security Keys With Passkey Support

Google’s updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords. Google announced the availability of Titan Security Keys with passkey support in mid-November 2023; the initial Titan Security Keys edition was used solely for multifactor authentication. Security keys offer a tangible token in the form of a device you may attach to a keyring and place in a pocket. For many people, a security key can be easier…

Read More

Cybersecurity career training for the real world

Cybersecurity career training for the real world

Riccardo Nobili’s passion for cybersecurity career training is palpable. Not only is Nobili the Head of Network at Leroy Merlin, a global home improvement and gardening retailer, but he is also a Cisco Networking Academy instructor where he enables students to become future cybersecurity defenders. If you’re also passionate about cybersecurity, check out our open opportunities. Scalable: Networks and student growth As the Head of Network at Leroy Merlin, Nobili is accountable for all parts…

Read More

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. A new report from U.S.-based cybersecurity company Proofpoint exposes a new attack campaign operated by a financially-oriented threat actor dubbed TA4557 with high financial data theft risks and possibly more risks such as intellectual property theft. In this social engineering campaign, the threat actor targets recruiters with benign content before infecting their machines with the More_Eggs malware. This…

Read More

Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines

Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines

Starting Dec. 18, publicly traded companies will need to report material cyber threats to the SEC. Deloitte offers business leaders tips on how to prepare for these new SEC rules. The U.S. Securities and Exchange Commission’s new rules around disclosure of cybersecurity incidents go into effect on Dec. 15 for public companies with fiscal years starting on or after that date. Publicly traded companies must annually report their processes for spotting, judging and mitigating cybersecurity…

Read More

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

The Cisco Talos Year in Review report released Tuesday highlights new trends in the cybersecurity threat landscape. We’ll focus on three topics covered: the ransomware cybercriminal ecosystem, network infrastructure attacks and commodity loader malware. More ransomware actors switched to extortion rather than encryption, while commodity loaders evolved to be stealthier and highly effective, although new major security improvements have seen the day in 2023, such as Microsoft Office disabling macros by default. Network devices are…

Read More

Google Workspace Marketplace: 4 Tips for Choosing the Best Apps

Google Workspace Marketplace: 4 Tips for Choosing the Best Apps

An Independent Security Verification badge is one indication that an app should go to the top of your list when evaluating options in the Google Workspace Marketplace. If you’re a Google Workspace administrator or user selecting an application from the Google Workspace Marketplace, your first task is to make sure an application does the job you want completed as easily as possible. Beyond that, you might use the following four indicators from a Google Workspace…

Read More

IT Professionals in ASEAN Confronting Rising Cyber Security Risks

IT Professionals in ASEAN Confronting Rising Cyber Security Risks

In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre of Excellence, in a bid to increase the region’s shared cyber threat defences. The centre is a response to a changing threat landscape. At the opening of the ACICE, Singapore’s Ministry of Defence said Singapore alone experienced a 174% increase in phishing attempts between 2021 and 2022, while Southeast Asia…

Read More

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report “does not identify an underlying security issue in our products.” Cybersecurity researchers from the firm Hunters discovered a vulnerability in Google Workspace that could allow unwanted access to Workspace APIs. The flaw is significant in that it could let attackers use privilege escalation to gain access that would otherwise only be available to users with Super Admin access. Hunters named this…

Read More
1 13 14 15 16 17 22