Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?

Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?

The head of security advocacy at Datadog, a cloud-based monitoring and analytics platform, has urged enterprises in Australia and the APAC region to accelerate phasing out long-lived credentials for popular hyperscale cloud services, warning that they remain a serious data breach risk. Speaking with TechRepublic, Andrew Krug highlighted findings from Datadog’s State of Cloud Security 2024 report, which identified long-lived credentials as a persistent security risk factor. While credential management practices are improving, Krug noted…

Read More

Over 600,000 Personal Records Exposed by Data Broker

Over 600,000 Personal Records Exposed by Data Broker

A database linked to SL Data Services, a U.S.-based data broker, has exposed 644,869 sensitive records online. The records included personally identifiable information, property ownership details, vehicle records, court records, and background check documents, and they lacked password protection or encryption. Security researcher Jeremiah Fowler discovered the exposure and reported it to the review and cyber research site WebsitePlanet. He observed a sample of the documents stored in the 713.1 GB database and said 95%…

Read More

Top 5 Cyber Security Trends for 2025

Top 5 Cyber Security Trends for 2025

The cyber landscape is more turbulent than ever. Microsoft recently reported a 2.75-fold increase in ransomware attempts this year, while research predicts that global cyber attacks in 2024 will surge 105% compared to 2020. There is a dire need for more qualified cyber professionals as generative AI is lowering the barrier to entry for attacks. Unfortunately, cyber skills gaps have been reported in both the U.K. and Australia, with women making up only a quarter…

Read More

Securing Ireland's Technology Future

Securing Ireland's Technology Future

Shaping AI Governance and Securing the Digital Age As Ireland gears up for the election this week, here at Cisco, we’ve been reflecting on the pivotal role technology now plays across the issues politicians talk about when they knock on doors and make pitches to the electorate. Whether defining Ireland’s economic growth prospects, changing the way we work, or delivering more innovative and secure public services; the way we use new technologies underpins so many…

Read More

Securing Ireland's Technology Future

Securing Ireland's Technology Future

As Ireland gears up for the election this week, here at Cisco, we’ve been reflecting on the pivotal role technology now plays across the issues politicians talk about when they knock on doors and make pitches to the electorate. Whether defining Ireland’s economic growth prospects, changing the way we work, or delivering more innovative and secure public services; the way we use new technologies underpins so many of the issues voters in Ireland care about…

Read More

Starbucks, Supermarkets Targeted in Ransomware Attack

Starbucks, Supermarkets Targeted in Ransomware Attack

Starbucks and several major U.K. supermarkets experienced disruption due to a ransomware attack on the prominent supply chain software provider Blue Yonder. The company disclosed the incident on Thursday, Nov. 21, and it was still working to restore services the following Monday. The disruption to the Blue Yonder platform prevented Starbucks from paying its baristas and managing their schedules, according to the Wall Street Journal. As a result, cafe managers had to manually calculate their…

Read More

Australia Passes Groundbreaking Cyber Security Law

Australia Passes Groundbreaking Cyber Security Law

Australia passed its first-ever Cyber Security Act on Nov. 25, introducing various measures to strengthen the nation’s defenses. Among its key provisions is a requirement that organisations report to the government if they pay ransomware criminals — a practice that has become widespread globally. The Cyber Security Act follows Australia’s Cyber Security Strategy 2023-2030. The strategy, designed to position Australia as a leader in cyber resilience, foreshadowed several measures in the law, including creating a…

Read More

From Service to Security: My Path to Empowerment at Cisco

From Service to Security: My Path to Empowerment at Cisco

My career journey began before I was even old enough to realize it. Growing up, my mother, a single parent and immigrant, turned her handcrafted items into our family’s livelihood at local flea markets, where I would often accompany her. Her resilience and entrepreneurial skills were my earliest lessons in business, laying the groundwork for my own aspirations. These early experiences instilled in me a drive to make a meaningful impact, a drive that has…

Read More

From Service to Security: My Path to Empowerment at Cisco

From Service to Security: My Path to Empowerment at Cisco

My career journey began before I was even old enough to realize it. Growing up, my mother, a single parent and immigrant, turned her handcrafted items into our family’s livelihood at local flea markets, where I would often accompany her. Her resilience and entrepreneurial skills were my earliest lessons in business, laying the groundwork for my own aspirations. These early experiences instilled in me a drive to make a meaningful impact, a drive that has…

Read More

1.1 Million UK NHS Employee Records Exposed

1.1 Million UK NHS Employee Records Exposed

Over a million NHS employee records — including email addresses, phone numbers, and home addresses — were exposed online due to a misconfiguration of the low-code website builder Microsoft Power Pages. In September, researchers with the software-as-a-service security platform AppOmni identified a large shared business service provider for the NHS that was allowing unauthorised access to sensitive data through insecure permission settings on Power Pages. Specifically, the permissions on some tables and columns in Power…

Read More
1 2 3 15