cyber threats

Future-proofing Fraud Prevention in Digital Channels: APAC FI Study

GBG and The Asian Banker surveyed 324 respondents from financial institutions (FIs) in six key Asia-Pacific markets including Australia, China, Indonesia, Malaysia, Thailand, and Vietnam to better understand emerging and future fraud prevention trends in an increasingly digital world specifically for financial institutions. This study aims to gauge the digitalisation priorities of financial institutions based […]

Future-proofing Fraud Prevention in Digital Channels: APAC FI Study Read More »

ACSC Annual Cyber Threat Report: July 2019 to June 2020

The Australian Signals Directorate’s (ASD) Australian Cyber Security Centre (ACSC) is the leading operational arm for the Australian Government responsible for strengthening the nation’s cyber resilience, and for identifying, mitigating and responding to cyber threats against Australian interests. The ACSC also manages ReportCyber on behalf of federal, state and territory law enforcement agencies, providing a

ACSC Annual Cyber Threat Report: July 2019 to June 2020 Read More »

Anatomy of a Cloud Assessment and Authorisation

Introduction Cloud computing offers a range of potential cyber security benefits for Cloud Consumers to leverage, providing access to advanced security technologies, shared responsibilities, fine-grained access management, comprehensive monitoring and highly redundant geographically dispersed cloud services. For many organisations, cloud computing can provide significant improvements to their cyber security, mitigating the risk of many current

Anatomy of a Cloud Assessment and Authorisation Read More »

What is Lurking on Your Network

Exposing the threat of shadow devices Most internet communications rely on DNS, although it is often not sufficiently secured, which creates vulnerabilities that can be exploited for data exfiltration and spreading malware. Over 91 percent of malware uses DNS to communicate with C&C servers, lock up data for ransom or exfiltrate data. Existing security controls,

What is Lurking on Your Network Read More »

Cloud Threat Landscape Report 2020

Introduction With organizations increasingly using cloud environments for scaling and accelerating operations, understanding the unique cyber threat landscape of this field is critical. Leveraging IBM’s global presence and cloud incident response capabilities, we have conducted an in-depth analysis of cloud-related cybersecurity incidents our team has responded to over the past year in order to discern

Cloud Threat Landscape Report 2020 Read More »

Innovate for Cyber Resilience

Third Annual State of Cyber Resilience Lessons from Leaders to Master Cybersecurity Execution At first glance, the basics of cybersecurity are improving and cyber resilience is on the rise. Our latest research shows that most organizations are getting better at preventing direct cyberattacks. But in the shape-shifting world of cybersecurity, attackers have already moved on

Innovate for Cyber Resilience Read More »

The 2020 State of Password and Authentication Security Behaviors Report

Cyber threats and attacks on individual users and organizations have not diminished. Phishing scams, stolen credentials, and account takeovers continue to rise, making it imperative for businesses to have policies and practices in place to reduce the risks created by poor password and authentication behaviors. What is perhaps more important is that the security policies

The 2020 State of Password and Authentication Security Behaviors Report Read More »

State of the Phish 2019

The report uncovers phishing cyberattack trends across more than 15 industries and details the fundamental cybersecurity knowledge of more than 7,000 working adults in Australia, the U.S., France, Germany, Italy, Japan, and the UK. Data from tens of millions of simulated phishing attacks sent over a one-year period were analysed along with nearly 15,000 cybersecurity professional survey responses, from both Proofpoint customers and outside organisations, to provide an in-depth look at state of global phishing attacks.

State of the Phish 2019 Read More »