Top 5 Cyber Security Trends for 2025

Top 5 Cyber Security Trends for 2025

The cyber landscape is more turbulent than ever. Microsoft recently reported a 2.75-fold increase in ransomware attempts this year, while research predicts that global cyber attacks in 2024 will surge 105% compared to 2020. There is a dire need for more qualified cyber professionals as generative AI is lowering the barrier to entry for attacks. Unfortunately, cyber skills gaps have been reported in both the U.K. and Australia, with women making up only a quarter…

Read More

Starbucks, Supermarkets Targeted in Ransomware Attack

Starbucks, Supermarkets Targeted in Ransomware Attack

Starbucks and several major U.K. supermarkets experienced disruption due to a ransomware attack on the prominent supply chain software provider Blue Yonder. The company disclosed the incident on Thursday, Nov. 21, and it was still working to restore services the following Monday. The disruption to the Blue Yonder platform prevented Starbucks from paying its baristas and managing their schedules, according to the Wall Street Journal. As a result, cafe managers had to manually calculate their…

Read More

From Service to Security: My Path to Empowerment at Cisco

From Service to Security: My Path to Empowerment at Cisco

My career journey began before I was even old enough to realize it. Growing up, my mother, a single parent and immigrant, turned her handcrafted items into our family’s livelihood at local flea markets, where I would often accompany her. Her resilience and entrepreneurial skills were my earliest lessons in business, laying the groundwork for my own aspirations. These early experiences instilled in me a drive to make a meaningful impact, a drive that has…

Read More

From Service to Security: My Path to Empowerment at Cisco

From Service to Security: My Path to Empowerment at Cisco

My career journey began before I was even old enough to realize it. Growing up, my mother, a single parent and immigrant, turned her handcrafted items into our family’s livelihood at local flea markets, where I would often accompany her. Her resilience and entrepreneurial skills were my earliest lessons in business, laying the groundwork for my own aspirations. These early experiences instilled in me a drive to make a meaningful impact, a drive that has…

Read More

Resilience in Focus: How Boards Are Preparing for CPS 230

Resilience in Focus: How Boards Are Preparing for CPS 230

According to an industry expert, resilience has become a board-level concern for Australia’s financial services industry ahead of new CPS 230 Operational Risk Management regulations from the Australian Prudential Regulatory Authority, the industry’s regulatory body. Australian banks, insurers, and superannuation funds will be required to meet the APRA’s new consolidated CPS 230 standard for operational risk management. Those classified as “significant” financial institutions have until July 2025 to comply, while non-significant financial institutions have been…

Read More

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into clicking on malicious links in the first weeks of this holiday shopping season. As holiday excitement peaks and shoppers hunt for the perfect gifts and amazing deals, scammers are taking advantage of the buzz. The National Retail Federation projects holiday spending will reach between $979.5 and $989 billion this year, and cybercriminals are capitalizing by…

Read More

ANZ CIO Challenges: AI, Cybersecurity & Data Analytics for 2025

ANZ CIO Challenges: AI, Cybersecurity & Data Analytics for 2025

CIOs across Australia and New Zealand’s public sector face a “hard 12 months” managing their technology estates amid cost constraints, according to a leading regional Gartner analyst. However, there is optimism that investments in AI will deliver the productivity gains many anticipate. Gartner recently released the public sector findings from its CIO Technology Executive Survey. The firm found that 94% of ANZ government CIOs named data analytics as their top technology investment for 2025, followed…

Read More

1.1 Million UK NHS Employee Records Exposed

1.1 Million UK NHS Employee Records Exposed

Over a million NHS employee records — including email addresses, phone numbers, and home addresses — were exposed online due to a misconfiguration of the low-code website builder Microsoft Power Pages. In September, researchers with the software-as-a-service security platform AppOmni identified a large shared business service provider for the NHS that was allowing unauthorised access to sensitive data through insecure permission settings on Power Pages. Specifically, the permissions on some tables and columns in Power…

Read More

AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

For the third consecutive quarter, Gartner has found that cyber attacks staged using artificial intelligence are the biggest risk for enterprises. The consulting firm surveyed 286 senior risk and assurance executives from July through September, and 80% cited AI-enhanced malicious attacks as the top threat they were concerned about. This isn’t surprising, as evidence suggests AI-assisted attacks are on the rise. Other commonly cited emerging risks outlined in the report include AI-assisted misinformation, escalating political…

Read More

Network Hacking Course Pairs with Cisco Modeling Labs

Network Hacking Course Pairs with Cisco Modeling Labs

If you’ve ever been to Cisco Live and seen the booth with a display for you to pick locks, then you know about the Cisco Advanced Security Initiatives Group (ASIG). We are chartered with security testing and ethical hacking for all Cisco products and services, whether in the cloud or on-premises. Anything Cisco sells, we have a go at it and try to break it—finding vulnerabilities as early as possible—before it’s deployed on the internet…

Read More
1 2 3 4 5 25