Journal of Cyber Security and Mobility – Best Paper Awards
We are very pleased to announce the Best Paper Awards from the Journal of Cyber Security and Mobility! The Journal of Cyber Security and Mobility,…
We are very pleased to announce the Best Paper Awards from the Journal of Cyber Security and Mobility! The Journal of Cyber Security and Mobility,…
If you’ve spent any time in penetration testing, chances are you’ve crossed paths with Metasploit. The second edition of Metasploit tries to bring the book…
32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile, 68% are more realistic, noting…
Two critical local information-disclosure vulnerabilities affecting millions of Linux systems worldwide, potentially allowing attackers to extract sensitive password data through core dump manipulation. The Qualys…
A growing crisis is emerging in corporate cybersecurity operations, where organizational silos between IT and security teams are creating dangerous blind spots and slowing critical…
Steve Anderton, Brennan’s Head of Digital Solutions, recently hosted a series of breakfast briefings across Australia on the theme of cutting through AI hype. Customers…
As cyber threats grow in complexity and frequency, organizations increasingly recognize that their most significant vulnerability—and their most vigorous defense—lies not in technology but in…
The cybersecurity landscape is fundamentally transforming as artificial intelligence reshapes offensive and defensive security strategies. This evolution presents a dual challenge: leveraging AI to enhance…
As cyber threats continue to evolve and multiply, organizations are scrambling to develop effective incident response strategies that can withstand sophisticated attacks. Recent industry data…
Coles will no longer have a standalone chief digital officer, combining the function with customer responsibilities under a single executive. Michael Courtney, Coles Group The…
The identity and access management landscape is experiencing unprecedented transformation in 2025, driven by sophisticated cyber threats, quantum computing advances, and the explosive growth of…
This week on the Lock and Code podcast… There’s an easy way to find out what Facebook knows about you—you just have to ask. In…