Cybersecurity

ITSPmagazine Podcast

ITSPmagazine is a free online publication that focuses on information technology, cybersecurity, data privacy, the InfoSec community and the influence that all this has on our everyday lives – as businesses, individuals and the society in which we live. Delivered through articles, podcasts, webcasts, webinars, live panels, event coverage and talk shows, we explore the

ITSPmagazine Podcast Read More »

Secure CIO Podcast

Do you find the idea of going to market in search of a cybersecurity leader to be a daunting task? The Secure CIO is the podcast for Technology Executives who are tasked with hiring and retaining great cybersecurity leaders. Best-selling author Claire Pales, together with industry thought leaders, answers your questions about sourcing the right

Secure CIO Podcast Read More »

State of the Phish 2020

Do you have a good sense of how well users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting phishing attacks and the successes (and struggles) they’re experiencing? Our sixth annual State of the

State of the Phish 2020 Read More »

Joint Report on Publicly Available Hacking Tools

A report by international cyber security authorities highlights the use of five publicly available hacking tools and techniques, observed in recent cyber incidents around the world.

The report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the UK and USA.

‘Reports like this demonstrate our ability to pull together cyber security experts from across the globe, to give people a better understanding of what’s out there and how they can better defend their networks,’ said Alastair MacGibbon, Head of the Australian Cyber Security Centre.

‘Tools and techniques for exploiting networks and the data they hold are by no means limited for use by nation states or criminals on the dark web.’

Joint Report on Publicly Available Hacking Tools Read More »