w

Australian agtech startup SwarmFarm wins global accolade

Australian agtech innovation was in the spotlight recently when SwarmFarm Robotics founder Andrew Bate was awarded third place in the Agripreneur of the Year contest at the 2019 Future Agro Challenge Global Championships, beating competitors from more than 60 countries.




w

Insight – The growing appetite for international food and beverage in India

Australian food businesses will find a warm reception in India, where the expanding middle-class population, modern retail formats and entry of international e-commerce platforms are driving growth in the country’s food and beverage (F&B) retail sector.




w

Insight – Uncorking the growing wine market in India

In a country with a population of 1.3 billion and where around 700 million people are above the legal drinking age – a number growing by 19 million a year – India is a market with many opportunities for Australia’s winemakers.




w

Insight – From good to Greater: Why Australian F&B exporters should consider Taiwan as part of a holistic strategy

While the China market has been a miracle for Australian food exporters, the data belies many of the operating challenges individual Australian firms face.




w

Insight - Korean consumers anticipating arrival of new season Australian table grapes

Australian table grape exports to Korea have continuously increased year on year, with a three-fold increase each year from 162 tonnes in 2017; 776 tons in 2018 and 3,224 tons in 2019.




w

Insight – New routes to market for Australian brands in Sri Lanka and Bangladesh

With e-commerce accelerating in cities across India, it’s easy to miss how consumer behaviour is changing right across the South Asia region.




w

A musical journey from west to east

Thanh Bui discovered a passion for American soul music while growing up in Australia as the son of Vietnamese parents. It led him to a life as a performer, teacher and songwriter. Now, having written songs for some of the world’s biggest acts in Japanese and Korean pop, he is passing on his knowledge to the next generation.




w

Australian Startups Touch Down in the U.S., Bringing Innovative New Technologies

Austrade’s San Francisco Landing Pad announces eight new participants, bringing the total number of tech startups that have entered the program to 68.




w

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




w

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




w

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




w

What We've Learned About Business Resiliency

Business resiliency and the supply chain - they both were tested by the disruptions we've all experienced. But Patrick Potter of RSA says there are lessons to be learned from the response, and they will guide us as we prepare for the next evolution of our business climate.




w

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




w

Live Webinar | How to avoid the security dangers with working from home (WFH)




w

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




w

ENISA Launches Information Security Awareness Videos

The European Network and Information Security Agency [ENISA] has launched information security awareness videos in 23 European languages.




w

Ransomware Slams Healthcare, Logistics, Energy Firms

Attacks Traced to Gangs Wielding Nefilim, Snake Strains
Ransomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic.




w

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




w

‘Study with Australia’ to open doors to education globally

The Australian Trade and Investment Commission (Austrade) has partnered with social learning platform, FutureLearn.com to provide free online courses and help students stay ahead of the learning curve.



  • 2020 Media releases

w

Tritium to work with TATA AutoComp to supply DC fast chargers for electric vehicles

India’s highly respected TATA Group has selected Australian industry leader Tritium for its DC fast-charging expertise.




w

Russian university seeks Australian partners for fellowship and professorship program

A university in St Petersburg seeks partners in Australia for the university’s fellowship and professorship program. Researchers and lecturers interested in establishing research collaboration in IT, mechanics, optics, robotics, chemistry, lasers, arts, science, science communication and food biotechnologies are invited to send expressions of interest.




w

Digital transformation flows into success for water company in China

An Australian water treatment company is winning business in China amid the COVID-19 outbreak.



  • 2020 Latest from Austrade

w

Gekko Systems makes switch from mining equipment to life-saving ventilators

When Ballarat-based Gekko Systems heard the local medical community was worried about access to ventilators needed to respond to the COVID-19 crisis, the company sprang into action.




w

Free trade deal with Indonesia set to kick-off on 5 July (Ministerial)

Australian exporters will soon start reaping the benefits of the Indonesia-Australia Comprehensive Economic Partnership Agreement (IA-CEPA), with Australia receiving formal notification that Indonesia has completed its domestic ratification processes.



  • 2020 Media releases

w

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




w

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




w

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




w

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




w

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




w

Live Webinar | How to avoid the security dangers with working from home (WFH)




w

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




w

RBI: Know Your Customer Norms - Letter Issued by UIDAI

The Reserve Bank of India on Sept. 28, 2011, issued a statement recognizing a letter issued by Unique Identification Authority of India containing details of name, address and Aadhaar number, as an officially valid document as contained in Rule 2[1][d] of the PML Rules, 2005.




w

Ransomware Slams Healthcare, Logistics, Energy Firms

Attacks Traced to Gangs Wielding Nefilim, Snake Strains
Ransomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic.




w

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




w

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




w

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




w

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




w

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




w

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




w

Live Webinar | How to avoid the security dangers with working from home (WFH)




w

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




w

RBI: Know Your Customer Norms - Letter Issued by UIDAI

The Reserve Bank of India on Sept. 28, 2011, issued a statement recognizing a letter issued by Unique Identification Authority of India containing details of name, address and Aadhaar number, as an officially valid document as contained in Rule 2[1][d] of the PML Rules, 2005.




w

Ransomware Slams Healthcare, Logistics, Energy Firms

Attacks Traced to Gangs Wielding Nefilim, Snake Strains
Ransomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic.




w

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




w

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




w

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




w

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




w

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




w

Live Webinar | How to avoid the security dangers with working from home (WFH)




w

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps