dcsimg

IDC Ranks Tenable Number One in the Worldwide Vulnerability Management Market Share for 2019

IDC’s first-ever market share report for the worldwide device vulnerability management market ranks Tenable as #1 in market share for 2019 and credits the company for extending its reach far beyond vulnerability management. IDC recently published their Worldwide Device Vulnerability Management Market Shares, 2019: Finding the Transitional Elements Between Device Assessment Scanning and Risk-Based … [Read more...]

Teaching from home might become part of every teachers’ job description

“Hey Joe, I wanted to remind you that starting next Monday you will be expected to teach from home. The lesson material is in your inbox along with the list of pupils that are expected to follow them. We are sure it will take some adjustments, but we trust that by working together we can make the best of the current situation.  If you have any questions, feel free to let us … [Read more...]

A brief history of video game saves and data modification

Games consoles and handhelds have always been an interesting battleground for hacking activities. The homebrew scene for using hardware in interesting ways has a long and varied history, especially where porting games to run on different platforms is concerned. Tampering with games while playing them to gain a distinct advantage has always been frowned upon by the majority of players and … [Read more...]

How Do You Know Your Service Delivery Is Hitting Its Mark?

To answer this question, we need to start somewhere a little more obvious: Why is service delivery important? The obvious answer is that happy customers pay their bills and recommend your business to others. The next challenge becomes determining for certain whether they are happy (or not) with our service delivery—and if they are happy enough to refer us to others.   Read More … [Read more...]

Redesigning Digital Infrastructure To Support Remote Workforce

Diwakar Dayal discusses why organisations need to consider redesigning their digital infrastructure to suit the new normal of work.http://bwcio.businessworld.in/article/Redesigning-Digital-Infrastructure-To-Support-Remote-Workforce/27-04-2020-190333/ … [Read more...]

Our infrastructure needs cyber protection

Dick Bussiere shares how the uptake of solar and smart technology in the grid can potentially leave the energy infrastructure more vulnerable.https://links.streem.com.au/the-australian-20200506-eez8rVC9RluP … [Read more...]

This ‘EventBot’ banking Trojan can steal money from your phone: What should you do

Adam Palmer shares his thoughts on EventBot – a banking malware capable of stealing financial information and prompting users to give access to their device accessibility services. https://indianexpress.com/article/technology/tech-news-technology/this-banking-trojan-can-steal-money-from-your-phone-what-should-you-do-6413008/ … [Read more...]

New malware can steal data from air-gapped systems

Marty Edwards discusses why air-gaps are impractical in the digitally-connected era.https://www.technologydecisions.com.au/content/security/news/new-malware-can-steal-data-from-air-gapped-systems-1518410616 … [Read more...]

Cover Story: Disruptive Potential Emerges For IoT In Australia’s Industrial Internet

Dick Bussiere discusses why Australia’s approach to IoT regulation will be important as more enterprises adopt Industrial IoT.https://which-50.com/cover-story-disruptive-potential-of-iot-in-australia-could-be-stymied-by-regulation/ … [Read more...]

Managing critical infrastructure in today’s connected world

Gary Jackson discusses why critical infrastructure remains a high-value target for cybercriminals and the physical and digital threats organisations have to think about when developing a cybersecurity strategy.https://www.defenceconnect.com.au/key-enablers/6043-op-ed-managing-critical-infrastructure-in-today-s-connected-world … [Read more...]