to

Digital transformation flows into success for water company in China

An Australian water treatment company is winning business in China amid the COVID-19 outbreak.



  • 2020 Latest from Austrade

to

Gekko Systems makes switch from mining equipment to life-saving ventilators

When Ballarat-based Gekko Systems heard the local medical community was worried about access to ventilators needed to respond to the COVID-19 crisis, the company sprang into action.




to

Thai universities shift to online classes to tackle spread of COVID-19

Thai universities have shifted all classes to online channels to help manage the spread of COVID-19. The Thai government imposed closures of all educational institutions until August, as part of efforts to curb the spread of the virus.




to

A message from Austrade to our international education partners (5 May 2020)

While light is finally appearing at the end of the COVID-19 crisis tunnel, the Australian Government is working closer than ever before with states and territory governments, education providers and community organisations, to deliver support measures for our international student community.




to

Free trade deal with Indonesia set to kick-off on 5 July (Ministerial)

Australian exporters will soon start reaping the benefits of the Indonesia-Australia Comprehensive Economic Partnership Agreement (IA-CEPA), with Australia receiving formal notification that Indonesia has completed its domestic ratification processes.



  • 2020 Media releases

to

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




to

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




to

RBI: Know Your Customer Norms - Letter Issued by UIDAI

The Reserve Bank of India on Sept. 28, 2011, issued a statement recognizing a letter issued by Unique Identification Authority of India containing details of name, address and Aadhaar number, as an officially valid document as contained in Rule 2[1][d] of the PML Rules, 2005.




to

RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions

The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




to

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




to

RBI: Know Your Customer Norms - Letter Issued by UIDAI

The Reserve Bank of India on Sept. 28, 2011, issued a statement recognizing a letter issued by Unique Identification Authority of India containing details of name, address and Aadhaar number, as an officially valid document as contained in Rule 2[1][d] of the PML Rules, 2005.




to

RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions

The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




to

ENISA: Cybersecurity Aspects in the Maritime Sector

ENISA has published the first EU report ever on cybersecurity challenges in the Maritime sector. This principal analysis highlights essential key insights, as well as existing initiatives, as a baseline for cybersecurity. Finally, high-level recommendations are given for addressing these risks.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2




to

Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning




to

Annual Report to Congress on Breaches of Unsecured Protected Health Information

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

ENISA: Cybersecurity Aspects in the Maritime Sector

ENISA has published the first EU report ever on cybersecurity challenges in the Maritime sector. This principal analysis highlights essential key insights, as well as existing initiatives, as a baseline for cybersecurity. Finally, high-level recommendations are given for addressing these risks.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2




to

Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning




to

FDIC: Supervisory Approach to Payment Processing Relationships with Merchant Customers

The FDIC is clarifying its policy and supervisory approach related to facilitating payment processing services directly, or indirectly through a third party, for merchant customers engaged in higher-risk activities.




to

FDIC: Institutions Encouraged to Work with Borrowers Impacted by Shutdown

Five federal regulatory agencies encourage financial institutions to work with customers affected by the federal government shutdown.




to

FDIC Issues Guidance to Areas in Illinois Impacted by Severe Storms

The FDIC has announced a series of steps intended to provide regulatory relief to financial institutions and facilitate recovery in areas of Illinois affected by severe storms, straight-line winds, and tornadoes.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




to

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




to

Your Phone and Your Face: Anchoring Users to Real Identities