All Articles

Ordered by Date Received : Year: "2024" Month: "10" Day: "29" Hour: "09"
Page: 1 (of 0)

Total Articles in this collection: 21

Navigation Help at the bottom of the page
Article: US finalizes curbs on investment in AI and critical technology in China - published 2 months ago.
Content:
https://www.computerworld.com/article/3593646/us-finalizes-curbs-on-investment-in-ai-and-critical-technology-in-china.html   
Published: 2024 10 29 09:45:25
Received: 2024 10 29 09:51:48
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Article: US finalizes curbs on investment in AI and critical technology in China - published 2 months ago.
Content:
https://www.computerworld.com/article/3593646/us-finalizes-curbs-on-investment-in-ai-and-critical-technology-in-china.html   
Published: 2024 10 29 09:45:25
Received: 2024 10 29 09:51:48
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Article: Identity theft - published 3 months ago.
Content:
https://www.cyber.gov.au/threats/types-threats/identity-theft   
Published: 2024 10 11 12:00:00
Received: 2024 10 29 09:46:00
Feed: ACSC – Threats
Source: Australian Cyber Security Centre (ACSC)
Category: Threats
Topic: Cyber Security
Article: Identity theft - published 3 months ago.
Content:
https://www.cyber.gov.au/threats/types-threats/identity-theft   
Published: 2024 10 11 12:00:00
Received: 2024 10 29 09:46:00
Feed: ACSC – Threats
Source: Australian Cyber Security Centre (ACSC)
Category: Threats
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Principles of operational technology cyber security - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/publications/principles-operational-technology-cyber-security   
Published: 2024 10 02 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Article: Principles of operational technology cyber security - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/publications/principles-operational-technology-cyber-security   
Published: 2024 10 02 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Essential Eight Maturity Model and ISM Mapping - published 3 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-ism-mapping   
Published: 2024 10 02 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Article: Essential Eight Maturity Model and ISM Mapping - published 3 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-ism-mapping   
Published: 2024 10 02 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Article: Essential Eight Assessment Process Guide - published 3 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-assessment-process-guide   
Published: 2024 10 02 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Article: Essential Eight Assessment Process Guide - published 3 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-assessment-process-guide   
Published: 2024 10 02 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Mitigation strategies for edge devices: executive guidance - published 3 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/network-hardening/mitigating-strategies-edge-devices-executive-guidance   
Published: 2024 10 03 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Article: Mitigation strategies for edge devices: executive guidance - published 3 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/network-hardening/mitigating-strategies-edge-devices-executive-guidance   
Published: 2024 10 03 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Safe software deployment: how software manufacturers can ensure reliability for customers - published 2 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/governance-and-user-education/secure-by-design/safe-software-deployment-how-software-manufacturers-can-ensure-reliability-for-customers   
Published: 2024 10 25 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Article: Safe software deployment: how software manufacturers can ensure reliability for customers - published 2 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/governance-and-user-education/secure-by-design/safe-software-deployment-how-software-manufacturers-can-ensure-reliability-for-customers   
Published: 2024 10 25 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Article: Essential Eight Maturity Model FAQ - published 2 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-faq   
Published: 2024 10 28 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Article: Essential Eight Maturity Model FAQ - published 2 months ago.
Content:
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-faq   
Published: 2024 10 28 12:00:00
Received: 2024 10 29 09:45:59
Feed: ACSC – Publications
Source: Australian Cyber Security Centre (ACSC)
Category: Publications
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Secure-by-Design Foundations - published 5 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/secure-design-foundations   
Published: 2024 07 31 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: Secure-by-Design Foundations - published 5 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/secure-design-foundations   
Published: 2024 07 31 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Best practices for event logging and threat detection - published 5 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/best-practices-event-logging-and-threat-detection   
Published: 2024 08 22 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: Best practices for event logging and threat detection - published 5 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/best-practices-event-logging-and-threat-detection   
Published: 2024 08 22 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: The Silent Heist: Cybercriminals use information stealer malware to compromise corporate networks - published 4 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/the-silent-heist-info-stealer-malware-used-to-compromise-corporate-networks   
Published: 2024 09 02 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: The Silent Heist: Cybercriminals use information stealer malware to compromise corporate networks - published 4 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/the-silent-heist-info-stealer-malware-used-to-compromise-corporate-networks   
Published: 2024 09 02 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: New joint advisory on Russian military cyber tactics released - published 4 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-joint-advisory-on-russian-military-cyber-tactics-released   
Published: 2024 09 06 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: New joint advisory on Russian military cyber tactics released - published 4 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-joint-advisory-on-russian-military-cyber-tactics-released   
Published: 2024 09 06 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: New joint advisory on PRC botnet operations released - published 4 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-joint-advisory-prc-botnet-operations-released   
Published: 2024 09 19 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: New joint advisory on PRC botnet operations released - published 4 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-joint-advisory-prc-botnet-operations-released   
Published: 2024 09 19 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: New guidance on detecting and mitigating Active Directory compromises - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-guidance-detecting-and-mitigating-active-directory-compromises   
Published: 2024 09 26 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: New guidance on detecting and mitigating Active Directory compromises - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-guidance-detecting-and-mitigating-active-directory-compromises   
Published: 2024 09 26 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Cyber Security Awareness Month 2024 - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/cyber-security-awareness-month-2024   
Published: 2024 10 01 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: Cyber Security Awareness Month 2024 - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/cyber-security-awareness-month-2024   
Published: 2024 10 01 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Cyber Security for Operational Technology - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/cyber-security-operational-technology   
Published: 2024 10 02 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: Cyber Security for Operational Technology - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/cyber-security-operational-technology   
Published: 2024 10 02 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: Iranian-based cyber actors compromising critical infrastructure networks - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/iranian-based-cyber-actors-compromising-critical-infrastructure-networks   
Published: 2024 10 17 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: Iranian-based cyber actors compromising critical infrastructure networks - published 3 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/iranian-based-cyber-actors-compromising-critical-infrastructure-networks   
Published: 2024 10 17 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: New guidance for software and service manufacturers deploying system updates - published 2 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-guidance-software-and-service-manufacturers-deploying-system-updates   
Published: 2024 10 25 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Article: New guidance for software and service manufacturers deploying system updates - published 2 months ago.
Content:
https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-guidance-software-and-service-manufacturers-deploying-system-updates   
Published: 2024 10 25 12:00:00
Received: 2024 10 29 09:45:58
Feed: ACSC – News
Source: Australian Cyber Security Centre (ACSC)
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: barox appoints new Head of Engineering - published 2 months ago.
Content: barox Kommunikation has named Jeneeben Jesujeevagan as Head of Engineering, to reinforce the company’s advanced technical development and global client support. Based from the company’s headquarters in Switzerland, Jesujeevagan will head the technical development of the barox range and champion its technology partner integrations, harnessing barox’s cap...
https://securityjournaluk.com/barox-appoints-new-head-of-engineering/   
Published: 2024 10 29 09:03:36
Received: 2024 10 29 09:22:45
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Article: barox appoints new Head of Engineering - published 2 months ago.
Content: barox Kommunikation has named Jeneeben Jesujeevagan as Head of Engineering, to reinforce the company’s advanced technical development and global client support. Based from the company’s headquarters in Switzerland, Jesujeevagan will head the technical development of the barox range and champion its technology partner integrations, harnessing barox’s cap...
https://securityjournaluk.com/barox-appoints-new-head-of-engineering/   
Published: 2024 10 29 09:03:36
Received: 2024 10 29 09:22:45
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Article: PIXM protects MSPs from credential theft and phishing attacks - published 2 months ago.
Content:
https://www.helpnetsecurity.com/2024/10/29/pixm-msps-phishing-protection/   
Published: 2024 10 29 09:00:40
Received: 2024 10 29 09:17:57
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: PIXM protects MSPs from credential theft and phishing attacks - published 2 months ago.
Content:
https://www.helpnetsecurity.com/2024/10/29/pixm-msps-phishing-protection/   
Published: 2024 10 29 09:00:40
Received: 2024 10 29 09:17:57
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Chubb hiring Lead DevSecOps Engineer in Hyderabad, Telangana, India | LinkedIn - published 2 months ago.
Content: Job Description Do you thrive in high-impact leadership roles driving measurable change? Are you passionate about DevSecOps, cloud, and fostering ...
https://in.linkedin.com/jobs/view/lead-devsecops-engineer-at-chubb-4061557493   
Published: 2024 10 28 20:18:57
Received: 2024 10 29 09:03:21
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Chubb hiring Lead DevSecOps Engineer in Hyderabad, Telangana, India | LinkedIn - published 2 months ago.
Content: Job Description Do you thrive in high-impact leadership roles driving measurable change? Are you passionate about DevSecOps, cloud, and fostering ...
https://in.linkedin.com/jobs/view/lead-devsecops-engineer-at-chubb-4061557493   
Published: 2024 10 28 20:18:57
Received: 2024 10 29 09:03:21
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment

All Articles

Ordered by Date Received : Year: "2024" Month: "10" Day: "29" Hour: "09"
Page: 1 (of 0)

Total Articles in this collection: 21


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor