COMPANY NEWS: Builds upon long-time partnership to unify network, endpoint, and log data
Security researchers at Cisco's Talos unit have discovered a campaign they have named ArcaneDoor, which they say is "the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors".
COMPANY NEWS: LogRhythm’s Eighth Quarterly Release Enhances Global Security Communication and Collaboration
GUEST OPINION: Sophisticated cybercriminals understand the weakest point in the digital defences of any organisation continues to be the same: its users.
COMPANY NEWS: Safe Security, the leader in AI-based cyber risk management SaaS platforms, today announced the close of a US$50 million Series B round led by Sorenson Capital, with participation from Eight Roads, venture capital arm of Fidelity Investments, Telstra Ventures, WTI, and all existing investors.
GUEST OPINION: In the face of economic turmoil, businesses are confronting the dual challenge of declining or stagnating cybersecurity budgets and escalating and increasingly complex threats, Telstra Ventures revealed today, after bringing together industry leaders from AttackIQ, Cofense and Corvus Insurance to discuss how to tackle the issue.
GUEST OPINION: As with all technology, new tools are iterations built on what came before, and classic network logging and metrics are no different.
GUEST OPINION: A recent independent survey of 1,300 CIOs from different parts of the world, including a significant representation from Australia, shows interesting points about cybersecurity perceptions. The majority of respondents agree that there is a growing need for the convergence of security and observability. The report shows that 87% of Australian CIOs and 88% of all CIOs worldwide are convinced that observability and security practices together are crucial in establishing a DevSecOps culture.
GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises worldwide, exploring the obstacles and threats organisations face when protecting AD and how they adapt to address these growing concerns.
GUEST OPINION by Glen Maloney, ANZ Regional Sales Manager at ExtraHop: First released in 2013, the MITRE ATT&CK framework is a global knowledge base of adversary tactics and techniques designed to help organisations stay one step ahead of possible security threats.
Cybersecurity knowledge base expands to support evolving security landscape
COMPANY NEWS: ExtraHop, the leader in cloud-native network detection and response (NDR), today announced that ExtraHop researchers consulted with MITRE in the development of the new network detection and response methodologies included in the latest version of the ATT&CK framework.
Security intelligence company LogRhythm has acquired cloud-based analytics platform and threat detection provider MistNet.
Organisations must gain better visibility into the endpoints of their IT systems if they do not want to be surprised by attacks, the head of Cyber Security Strategy at VMware Carbon Black says.
To what degree can you hope to control the actions of an attacker, says Jim Cook, ANZ Regional Director, Attivo Networks
When we hear about cybersecurity incidents, it is mostly because an attacker is in the box seat and in control. Perhaps they have breached a company and exfiltrated data, or unleashed ransomware or some other type of malware payload.
Everyone got a bit of what they wanted. No one got everything, that sounds like the basis for a good[…]
Is this article ironic?
The safest way not to get snared is to avoid anything financial on your devices plus do not participate in[…]
Who do we trust here? A professional cloud provider with many customers or a monopolistic ticketing agency that can never[…]
I knew this scam was full of shit because it didn't present any actual evidence of the supposed hacker having[…]