Research

The Future of Work in the New Normal

THE EMERGENCE OF The New Normal The COVID-19 pandemic disrupted the workplace, forcing organisations to accommodate a large remote workforce. Business and IT decision-makers have had to very quickly re-think their strategies and investments to ensure communication and collaboration can continue against this backdrop. While many organisations have a business continuity plan, global businesses had

The Future of Work in the New Normal Read More »

The Hacker Infrastructure and Underground Hosting: Services Used by Criminals

Trend Micro has released research that states organizations’ on-premise and cloud-based servers are compromised, abused and rented out as part of a sophisticated criminal monetization lifecycle. To understand how the criminal underground operates, one need to understand not only the criminals, their motivations, and their business models, but also the infrastructure and services that underpin

The Hacker Infrastructure and Underground Hosting: Services Used by Criminals Read More »

2020 Unisys Security Index™

EXECUTIVE SUMMARY The Unisys Security Index™️ has tracked global security concerns for 14 years. Overall, the world remains on edge – global security concerns are at their highest level since the first Unisys Security Index in 2007. With a score of 175 out of 300, the 2020 Unisys Security Index remains at a historical high.

2020 Unisys Security Index™ Read More »

COVID-19 impact on Australian adults’ online activities and attitudes

Overview Australia’s COVID-19 social distancing and isolation measures have led to significant changes in the way we live, triggering dramatic lifestyle changes for families and individuals across the country. One of the most notable changes is our increased dependence on the internet to maintain social and economic connections. This research report, based on a survey

COVID-19 impact on Australian adults’ online activities and attitudes Read More »

The Cybersecurity Landscape: Challenges and How to Overcome Them

The Current State of Cybersecurity Companies must protect their own and their customers’ most private and essential information from cybercriminals, and it’s a 24/7 job that requires constant preparedness and instant response. With attacks coming from many different types of attack vectors across many different attack surfaces, cybersecurity is an ever-evolving priority for executives in

The Cybersecurity Landscape: Challenges and How to Overcome Them Read More »

An Insider View into the Increasingly Complex Kingminer Botnet

Sophos has released new research about the use of servers in carrying out attacks; “An Insider View into the Increasingly Complex Kingminer Botnet”. The Kingminer botnet attempts to gain server access by brute-forcing login credentials, and Sophos now finds that it’s using the infamous EternalBlue exploit in an attempt to spread malware among other attack

An Insider View into the Increasingly Complex Kingminer Botnet Read More »