WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Resources > Whitepapers > 4 Unique Challenges of Social Media Compliance
I'm For Real
Enter your details once to access all our information and resources
Cyber Security Hub™ (CyberSec Hub®) is a young and innovative Melbourne-based cyber security organisation with a primary focus on security testing services and governance, risk & compliance (GRC).
whitePaper | June 28, 2022
Braking performance, corner analysis, pit stop strategy breakdowns. To watch a Formula 1 race today is as much about being an adrenaline junkie as it is being a data geek, thanks to the 300 sensors on an F1 car sending more than 1.1 million data points to the pits every second1.
whitePaper | May 5, 2022
The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.
whitePaper | August 26, 2022
The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.
whitePaper | September 28, 2022
The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.
whitePaper | April 13, 2023
Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.
whitePaper | December 29, 2022
Businesses make up the core of an economy. And cyberattacks are among the topmost risks faced by any business organization irrespective of its size and domain of operation. Therefore, it is well established that cyber-attacks have a significant economic impact. Most of the attacks and breaches are financially motivated.
Conference
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE