Category: Uncategorized

Australia Aims to Be World’s ‘Most Cyber-Secure’ Country

ICYMI: New Cybersecurity Strategy Will Aspire to World-Topping Performance by 2030 Australian Home Affairs and Cyber Security Minister Clare O’Neil vowed during a speech to transform the country into the world’s most cyber-secure, saying experts will start work on a strategy intended to outdo the rest of the world by 2030. The country has recently…
Read more

Australian Telecom Firm Leaks Data of 130,000 customers

‘We’re Sorry it Occurred, and We Know We Have Let You Down,’ Telstra CFO Says Australian telecommunications provider Telstra apologized for accidentally publishing names, numbers and addresses of over 130,000 customers whose details were supposed to be unlisted. The company apologized for the error and blamed a “misalignment of databases.”http://dlvr.it/SfBt79

Australia Aims to Be World’s ‘Most Cyber-Secure’ Country

New Cybersecurity Strategy Will Aspire to World-Topping Performance by 2030 Australian Home Affairs and Cyber Security Minister Clare O’Neil vowed during a speech to transform the country into the world’s most cyber-secure, saying experts will start work on a strategy intended to outdo the rest of the world by 2030. The country has recently experienced…
Read more

A Plan to Address Future Healthcare Cyber Challenges

ICYMI: The Health Sector Coordinating Council is embarking on a five-year strategic plan to help the healthcare and public health sector address future cybersecurity threats, risks and associated difficulties, says Greg Garcia, executive director for cybersecurity at HSCC.http://dlvr.it/Sf953b

Avoiding Roadblocks on the Path to Cybersecurity Maturity

ICYMI: CISO Dan Wilkins on Improving Maturity, Priorities, Technologies An important element of cybersecurity maturity is defining what exactly an organization is trying to accomplish, says Dan Wilkins, CISO for the state of Arizona. With that mission in mind, security teams can align strategy, goals and benchmarks for cyber maturity.http://dlvr.it/Sf915Y

Apple Announces Advanced Data Protection for iCloud

Apple released several new security features on December 7th, 2022, designed to keep users’ sensitive data and communications secure. Advanced Data Protection for iCloud is one of the most notable features for …http://dlvr.it/Sf8qRj

Ransomware Defense: Common Mistakes to Avoid

ICYMI: This week’s edition of the ISMG Security Report discusses the mistakes enterprises commonly make when building ransomware defenses, the cybersecurity capabilities being built by the U.S. Department of Energy, and the first female CEO at Securonix – one of only a handful in the vendor community.http://dlvr.it/Sf75WZ

A Plan to Address Future Healthcare Cyber Challenges

The Health Sector Coordinating Council is embarking on a five-year strategic plan to help the healthcare and public health sector address future cybersecurity threats, risks and associated difficulties, says Greg Garcia, executive director for cybersecurity at HSCC.http://dlvr.it/Sf6vKb

Avoiding Roadblocks on the Path to Cybersecurity Maturity

CISO Dan Wilkins on Improving Maturity, Priorities, Technologies An important element of cybersecurity maturity is defining what exactly an organization is trying to accomplish, says Dan Wilkins, CISO for the state of Arizona. With that mission in mind, security teams can align strategy, goals and benchmarks for cyber maturity.http://dlvr.it/Sf6p3R

How AI is Transforming Businesses

ICYMI: While artificial intelligence (AI) is seen as a new phenomenon in mainstream society, it is not a new concept. As AI technologies increase, AI is becoming increasingly important for companies looking to …http://dlvr.it/Sf6Xdl