Top 10 business applications stories of 2022
30
Dec
2022

Top 10 business applications stories of 2022

For the world of business applications, the shade of Covid-19 faded somewhat in 2022, as the energy crisis, informed by…

30
Dec
2022

7 Million PII Leaked from Russia Ministry’s Traffic Dept

Data from the State Traffic Inspectorate of the Ministry of Internal Affairs of Russia Database has been made available online…

30
Dec
2022

ADHA drafts new security standards for My Health Record interconnection – Security – Software

Systems that interconnect with the government’s My Health Record will need to meet elevated security standards that align with the…

Nuclear secrets leak through USB via Insider
30
Dec
2022

Nuclear secrets leak through USB via Insider

Well, it cannot be termed exactly as an insider threat. But surely, an innocent mistake of an employee could have/might…

How to Reduce Clinician Friction in a Zero Trust Approach
30
Dec
2022

How to Reduce Clinician Friction in a Zero Trust Approach

A carefully honed zero trust approach can allow healthcare entities to reduce pushback from clinicians while still “raising barriers appropriately”…

Top 10 Computer Weekly Downtime Upload podcasts of 2022
30
Dec
2022

Top 10 Computer Weekly Downtime Upload podcasts of 2022

The Computer Weekly Downtime Upload podcast team were compelled by events to deviate from their usual light-hearted approach to enterprise…

30
Dec
2022

What Happens When You Bargain Wrong

The LockBit ransomware gang has listed its victim SSP Worldwide again, this time for wrong bargain! The Russian-threat group lectured…

30
Dec
2022

TPG Telecom predicts NBN 50Mbps and 100Mbps price convergence – Telco/ISP

TPG Telecom has predicted the cost of 50Mbps and 100Mbps services on the NBN could be the same within a…

Ohio Court rules out Ransomware Attack loss on Software
30
Dec
2022

Ohio Court rules out Ransomware Attack loss on Software

In one of the strange decisions taken by Ohio Supreme Court over a previous judgement pronounced earlier by Ohio Second…

Cybercriminals create new methods to evade legacy DDoS defenses
30
Dec
2022

Cybercriminals create new methods to evade legacy DDoS defenses

The number of DDoS attacks we see around the globe is on the rise, and that trend is likely to…

JasperReports Vulnerabilities
30
Dec
2022

CISA Warns of Active exploitation of JasperReports Vulnerabilities

Dec 30, 2022Ravie LakshmananPatch Management The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two-years-old security flaws impacting TIBCO…

Don't Buy Data Deletion Promises
30
Dec
2022

Don’t Buy Data Deletion Promises

Anna Delaney: Ransomware experts agree: Don’t buy data deletion promises, and how to avoid being at the heart of a…