Strategies for cultivating a supportive culture in zero-trust adoption
In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco, discusses the benefits of implementing a mature zero-trust...
Read more →In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco, discusses the benefits of implementing a mature zero-trust...
Read more →Nov 29, 2023NewsroomMalware / Threat Intelligence The recently disclosed critical security flaw impacting Apache ActiveMQ is being actively exploited by...
Read more →Vigil is an open-source security scanner that detects prompt injections, jailbreaks, and other potential threats to Large Language Models (LLMs)....
Read more →NAB is hailing the success of its payment prompts, claiming customers had so far abandoned $50 million in payments after...
Read more →The Commonwealth Bank of Australia plans to launch its own CommBank Customer Copilot and also has ambitions to develop an...
Read more →A National Disability Insurance Agency (NDIA) employee has been arrested and charged following an investigation into an insider leak of recipients’...
Read more →Entries have opened for the 2024 Australian IoT Awards, which recognise impact and innovation in the use of Internet of Things (IoT)...
Read more →Amazon is trying to lure big corporate customers to it AWS cloud computing service with a new chatbot for businesses,...
Read more →Nima Baiati, Executive Director & GM, Commercial Cybersecurity Solutions, Lenovo Perhaps not since the invention of the printing press has...
Read more →Telstra’s ongoing Integrated Public Number Database IPND woes continue, with the carrier paying another non-compliance fine, this time just over...
Read more →Transport for NSW has extended an agreement for access to an AI-based camera system used to detect mobile phone use...
Read more →A severe design flaw in Google Workspace’s domain-wide delegation feature discovered by threat hunting experts from Hunters’ Team Axon, can...
Read more →