Cybersecurity

Pradeep Tyagi

Channel Manager – ANZ at Malwarebytes A change agent, challenging status quo. 15+ years of experience in IT Industry across in Sales, Presales, Consulting, and Product development. Well versed in both Direct and Channel sales. Core Competencies: Business Development, Consulting, Analytical Thinking, Determined and Driven  Webinar END-POINT SECURITY – USER TO THE ENTERPRISE Linkedin Profile

Pradeep Tyagi Read More »

Col Inderjeet Singh

Chief Cyber Security Officer, Vara Technology Pvt Ltd An experienced Info Systems professional with experience of more than 27+ year across wide spectrum of areas spanning Info Security ,Risk Management, Cyber Security , Cyber Forensics, Cyber Warfare, Expertise in SOC and CERT, Cloud Computing, Big Data , Internet of Things (IoT) including IoT Security, Blockchain,

Col Inderjeet Singh Read More »

John Selby

Lecturer at Macquarie University Experienced Legal Academic and Commercial Internet Lawyer Specialties: New Institutional Economics Theory; Regulatory Theory; Corporations Law; Commercial Law; Contract Law; Torts; International Commercial Arbitration; Alternative Dispute Resolution; Civil Litigation; Internet Law; Cybersecurity; Privacy; Artificial Intelligence; Domain Names; Advanced Multiple Choice Assessment.  Webinar Episode Three – Discussion Focus – Cybersecurity Education &

John Selby Read More »

McAfee Labs COVID-19 Threats Report

Key Findings Cybercriminals leverage pandemic as entry mechanism into systems across the globe McAfee Advanced Programs Group releases daily COVID-19 threat dashboard Ransomware attacks evolve into data breaches as cybercriminals steal data prior to encryption New PowerShell malware increases 689% while total malware grows 1,902% over four quarters Disclosed incidents targeting public sector increase 73%,

McAfee Labs COVID-19 Threats Report Read More »

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020

Introduction Security leaders, while supporting business growth and digital transformation, struggle with a multitude of challenges.We know this because you tell us, both in ongoing conversations and as part of our annual benchmark survey.Some challenges are focused on security, such as needing better visibility or automation, or striving for greater simplicity of management and response.Some

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020 Read More »

Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection

Introduction The goal of this National Institute of Standards and Technology (NIST) Interagency Report (NISTIR) is to show practical approaches that manufacturers can use to strengthen cybersecurity in their manufacturing processes. Behavioral anomaly detection (BAD) tools can provide a key security component for sustaining business operations, particularly those based on industrial control systems (ICS). Because

Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection Read More »

Remote Workforce Security Report

OVERVIEW Securing the remote workforce has become a critical priority for organizations affected by the closing of offices and workplaces in the wake of the COVID-19 pandemic. Conducted during the height of the 2020 COVID-19 pandemic, this Remote Workforce Security Report reveals the state of securing the new remote workforce, key challenges and unique security

Remote Workforce Security Report Read More »

Australia Threat Report: Extended enterprise under threat

Introduction This research was conducted to understand the challenges and issues facing Australian businesses when it comes to escalating cyberattacks. It identifies trends in hacking and malicious attacks and the financial and reputational impact any breaches have had. It examines Australian organizations’ plans for securing new technology, for adopting cybersecurity frameworks and the complexity of

Australia Threat Report: Extended enterprise under threat Read More »