StickmanCyber Report: Australia's Cybersecurity Skills Crisis

StickmanCyber Report: Australia's Cybersecurity Skills Crisis

A new report has found that Australia’s available pool of cybersecurity skills is smaller than realised. The report, Australia’s Cybersecurity and Technical Skills Gap, an analysis by security provider StickmanCyber and based on an analysis of ABS census and labour force data, revealed a shortage of 10,000 technical roles throughout the country. There is just one cybersecurity professional for every 240 Australian businesses. The lack of Australian security professionals is partially to blame for the…

Read More

Common Business-Related Phishing Scams Include Fake HR and IT Subject Lines

Common Business-Related Phishing Scams Include Fake HR and IT Subject Lines

Think you’ve received an important document from HR? Be careful. KnowBe4’s quarterly phishing test report found that threat actors in Q2 often found success with emails spoofing HR departments. After an ill-fated click occurred, links in the body of emails and PDF documents were common vectors for attacks. TechRepublic spoke with KnowBe4 Security Awareness Advocate Erich Kron about the results of the phishing tests and how to keep businesses safe from ever-evolving, generative AI-powered phishing…

Read More

From Cybersecurity Practitioner to Advocacy: My Journey Back to Cisco

From Cybersecurity Practitioner to Advocacy: My Journey Back to Cisco

Hello Cisco Community! I’m thrilled to share my journey back to Cisco as a Technical Advocate focused on cybersecurity. My mission is to empower you with the knowledge and tools you need to succeed in your own cybersecurity quest. I’m excited to announce my first tutorial on eBPF and my Snack Minute video demo. The demo will offer in-depth information and practical insights to help you advance your career in cybersecurity. Here’s what you can…

Read More

Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat and DEF CON are two of the major security conferences in the U.S., drawing large crowds of cyber and AI decision-makers to Las Vegas. Black Hat USA 2024 runs from August 3-8, with most of the briefings occurring on August 7 and 8; DEF CON 32 runs from August 8-11. We’re rounding up the enterprise business tech news from Black Hat and DEF CON that is most relevant for IT and tech decision-makers….

Read More

Data Breaches Are Costing Australian Organisations, IBM Report Reveals

Data Breaches Are Costing Australian Organisations, IBM Report Reveals

IBM recently released its annual Cost of a Data Breach report, revealing that the average cost of a data breach in Australia reached a record-high of AUD $4.26 million (USD $2.77 million) in 2024. This represents a 27% increase since 2020. The report also highlighted that Australian organizations continue to be most threatened by the same threats that had dominated in previous years. Furthermore, with a deep cyber security skills crisis in the country, it’s…

Read More

Why Should You Pay for a Security Solution?

Why Should You Pay for a Security Solution?

We all love free stuff. (Costco samples, anyone?) However, when it comes to your family’s security, do free online protection tools offer the coverage you truly need? Not always. In fact, they might invade the privacy you’re trying to protect. Here’s why. Free tools don’t offer the level of advanced protection that life on today’s internet needs. For starters, you’ll want malware and antivirus protection that’s as sophisticated as the threats they shut down. Ours includes AI technology and…

Read More

A Commander’s-Intent-driven Network – Enabling Cyberspace Operations from the Tactical Edge and Beyond

A Commander’s-Intent-driven Network – Enabling Cyberspace Operations from the Tactical Edge and Beyond

As the U.S. Army makes the network its top priority to enable operations, AFCEA TechNet Augusta 2024 offers a unique platform to delve into how people, processes, and technology shape cyberspace operations in the Cyber Domain. I am thrilled to contribute to this vital discussion and invite you to join me in the Engagement Theater during our Solutions Review Session on Thursday, August 22, 2024, at 0900. I will be presenting alongside Cisco Learning Partner,…

Read More

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

A vulnerability in the ESXi hypervisor was patched by VMware last week, but Microsoft has revealed that it has already been exploited by ransomware groups to gain administrative permissions. VMware ESXi is a bare-metal hypervisor that enables the creation and management of virtual machines directly on server hardware, which may include critical servers. CVE-2024-37085 is an authentication bypass vulnerability that allows malicious actors with sufficient permissions to gain full access to a domain-joined ESXi host….

Read More

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware remains one of the most common forms of cyber attack — and it’s particularly threatening because it can be incredibly effective. Globally, ransomware damage costs are predicted to exceed $265 billion by 2031. These attacks can affect even the largest of organisations. In July, a hacking group disrupted more than 230 of Indonesia’s government agencies and services by infecting critical systems at a national data centre. Why organisations are tempted to pay ransoms Theoretically,…

Read More
1 3 4 5 6 7 22