"Cybersecurity is defined as the preservation of confidentiality, integrity and availability of information in the cyberspace." - ISO (International Organization for Standardization)
"Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user's assets. Organisation and user's assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organisation and user's assets against relevant security risks in the cyber environment." - ITU (International Telecommunications Union)
A new end-to-end facility to provide hands-on experience to future cyb.. Read More
The Centre is the world’s first industry solution for the maritime i.. Read More
There have been a significant number of attacks that have been targeted or timed around sensitive geopolitical incidents.
COE supports the making and implementation of new tech to promote counter threat adaptation and operations.
53% of Australian and New Zealand companies believe that IoT security is the greatest challenge in rolling out their IoT capabilities.
Since Australia is equipped with better technology, the country will be sending experts to train Indonesian cybersecurity personnel.
NetStinky sends an alert if there is anything associated with the network that would suggest that there is a sign of being compromised.
CERT NZ encourages Kiwis to use unique passwords, set up 2-factor authentication, update apps, and check privacy settings.
Research revealed that respondents agree with AI-based technologies for detecting and stopping attacks that target IoT devices.
The higherups in your organization may unintentionally be giving information away.
The people were put together to heighten confidentiality, integrity, and availability of cybersecurity standards in the Philippines.
Behavioural biometrics is much harder to imitate since each user has an idiosyncratic pattern of behaviour that AI can analyse.
We’re not just talking cybersecurity. It’s about guardsmen also.
Blockchain ID allows the data owners to have full control of their own personal data.
The country’s first ever hackathon will see 150 participants from across the nation compete to win RMB16,000
Even as the popularity of cryptocurrencies grows, so does their vulnerability to cyberattacks.
The game’s users may have to verify their identities through camera checks.
The risk of cyber attacks is growing and just like other countries in the world, New Zealand must find ways to counter this threat.
The Cyber Security Response Centre set up by the telecommunications company, Tata, will help its customers comply with the EU’s data protection laws.
The Hackuna Anti-Hack app blocks hackers, within the network, from hacking the user by simply pressing the Wi-Fi Blocker button.
The Memorandum of Understanding entails a closer cooperation on cybersecurity concerns with the state-owned Russian company.