y

Continuity Amid COVID-19: Ensuring Secure Business Continuity




y

Your Phone and Your Face: Anchoring Users to Real Identities




y

Live Webinar | How to avoid the security dangers with working from home (WFH)




y

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




y

ENISA Launches Guide on Building Effective IT Security Public Private Partnerships

The European Network and Information Security Agency has released a new guide on building effective IT security public private partnerships.




y

ENISA Launches Information Security Awareness Videos

The European Network and Information Security Agency [ENISA] has launched information security awareness videos in 23 European languages.




y

ENISA: Technical Guidelines on Minimum Security Measures

ENISA has issued guidance to national telecom regulatory authorities about the implementation of Article 13a, in particular about the security measures that providers of public communications networks must take to ensure security and integrity of these networks.




y

Ransomware Slams Healthcare, Logistics, Energy Firms

Attacks Traced to Gangs Wielding Nefilim, Snake Strains
Ransomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic.




y

Zoom's NY Settlement Spells Out Security Moves

Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption Company
Zoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company.




y

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




y

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




y

‘Study with Australia’ to open doors to education globally

The Australian Trade and Investment Commission (Austrade) has partnered with social learning platform, FutureLearn.com to provide free online courses and help students stay ahead of the learning curve.



  • 2020 Media releases

y

Insight - Strong partnership ensures beef supply to China during COVID-19

A strong and trusted partnership between a Wuhan based distributor of Australian beef and their Australian supplier ensured shipments continued during the worst of the pandemic crisis.




y

Tritium to work with TATA AutoComp to supply DC fast chargers for electric vehicles

India’s highly respected TATA Group has selected Australian industry leader Tritium for its DC fast-charging expertise.




y

Leading talent recruitment company seeks online internship program partner

A leading overseas talent recruitment platform in China is seeking to partner with Australian universities for its online internship system. Successful partners will work with established companies in China to provide online internship opportunities to graduates.




y

Russian university seeks Australian partners for fellowship and professorship program

A university in St Petersburg seeks partners in Australia for the university’s fellowship and professorship program. Researchers and lecturers interested in establishing research collaboration in IT, mechanics, optics, robotics, chemistry, lasers, arts, science, science communication and food biotechnologies are invited to send expressions of interest.




y

Digital transformation flows into success for water company in China

An Australian water treatment company is winning business in China amid the COVID-19 outbreak.



  • 2020 Latest from Austrade

y

Gekko Systems makes switch from mining equipment to life-saving ventilators

When Ballarat-based Gekko Systems heard the local medical community was worried about access to ventilators needed to respond to the COVID-19 crisis, the company sprang into action.




y

Indian university seeks academic and research collaboration partners for clinical, preclinical and health sciences

An Indian university in Mysuru, Karnataka seeks research collaborations across pharmacy, medicine, dental and life sciences. Opportunities also exist for short term training programs and fellowships abroad.




y

A message from Austrade to our international education partners (5 May 2020)

While light is finally appearing at the end of the COVID-19 crisis tunnel, the Australian Government is working closer than ever before with states and territory governments, education providers and community organisations, to deliver support measures for our international student community.




y

Austrade regional market update on the impact of COVID-19 (as at 5 May 2020)

Austrade will provide weekly regional updates on the progression and impact of COVID-19 around the world, to support the international education sector as the situation continues to evolve. These reports are compiled using the latest on-the-ground information and advice.




y

Free trade deal with Indonesia set to kick-off on 5 July (Ministerial)

Australian exporters will soon start reaping the benefits of the Indonesia-Australia Comprehensive Economic Partnership Agreement (IA-CEPA), with Australia receiving formal notification that Indonesia has completed its domestic ratification processes.



  • 2020 Media releases

y

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




y

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




y

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




y

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




y

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




y

Testing Medical Device Security During COVID-19 Crisis

As manufacturers - including companies such as automakers that do not typically produce healthcare devices - race to help fill medical equipment shortages during the COVID-19 crisis, steps must be taken to ensure adequate security testing, says Fairuz Rafique of cybersecurity services firm EmberSec.




y

Ensuring Secure Business Continuity Amid COVID-19 Chaos




y

Your Phone and Your Face: Anchoring Users to Real Identities




y

Live Webinar | How to avoid the security dangers with working from home (WFH)




y

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




y

FDIC: Tips on Preparing Financially for a Natural Disaster or a Fire

The summer 2011 issue of 'FDIC Consumer News' features tips on how to prepare financially for a natural disaster, a fire or another tragedy, especially one that requires people to evacuate their home and not return for days or weeks.




y

RBI: Know Your Customer Norms - Letter Issued by UIDAI

The Reserve Bank of India on Sept. 28, 2011, issued a statement recognizing a letter issued by Unique Identification Authority of India containing details of name, address and Aadhaar number, as an officially valid document as contained in Rule 2[1][d] of the PML Rules, 2005.




y

RBI: Anti-Money Laundering, Combating of Financing of Terrorism Standards

The Reserve Bank of India on Sept. 22, 2011, issued a letter to financial institutions regarding anti-money laundering and the combating of financing of terrorism standards.




y

RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions

The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions.




y

Ransomware Slams Healthcare, Logistics, Energy Firms

Attacks Traced to Gangs Wielding Nefilim, Snake Strains
Ransomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic.




y

Zoom's NY Settlement Spells Out Security Moves

Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption Company
Zoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company.




y

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




y

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




y

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




y

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




y

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




y

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




y

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




y

Testing Medical Device Security During COVID-19 Crisis

As manufacturers - including companies such as automakers that do not typically produce healthcare devices - race to help fill medical equipment shortages during the COVID-19 crisis, steps must be taken to ensure adequate security testing, says Fairuz Rafique of cybersecurity services firm EmberSec.




y

Ensuring Secure Business Continuity Amid COVID-19 Chaos




y

Your Phone and Your Face: Anchoring Users to Real Identities




y

Live Webinar | How to avoid the security dangers with working from home (WFH)




y

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps