Articles

  • Dec 29, 2024 | cybersecurityasia.net | Mark Lukie

    The battle between cyberthreats and cybersecurity is never ending. Cyber attackers continuously evolve their behaviours, tools and techniques to hit new targets, exploit new opportunities and evade detection, while ever-advancing security solutions innovate and adapt to protect against them. The end of the year is a good time to consider how this landscape might evolve over the next 12 months.

  • Nov 10, 2024 | frontier-enterprise.com | Mark Lukie

    Businesses across Singapore are embracing AI-driven tools to enhance productivity and decision-making. However, the potential use of “shadow AI” — the unauthorised use of unapproved or unsanctioned AI technologies within organisations — could be putting your organisation at risk. The term “shadow AI” originates from “shadow IT,” where employees use devices, cloud services, or applications without the knowledge or consent of the IT department. The use of shadow AI is equally concerning.

  • Feb 20, 2024 | cybersecurityasean.com | Mark Lukie |Barracuda APAC

    By Mark Lukie, Director of Solution Architects, Barracuda APACAs the Director of Solution Architects at Barracuda APAC, I find myself at the forefront of the fight against cyber threats affecting businesses in the Asia-Pacific region. I have seen at first hand the full cost to a business of containing, neutralising and recovering from an attack.

  • Jan 24, 2024 | itwire.com | Mark Lukie |Matt Caffrey

    GUEST OPINION: How does credential stuffing work? Initially, a 3rd party service is breached, and credentials are stolen. There have been many high-profile organisations that have had their customer's user credentials stolen, I don't wish to pick on anyone in particular. Usually, it is a combination of email address, username, and password (typically hashed/encrypted). These credentials are then published on the dark web for bad actors to purchase and use in automated credential-stuffing attacks.

  • Jan 8, 2024 | itbrief.com.au | Mark Lukie

    A recent study for Forrester Consulting found that 83% of cybersecurity decision-makers in Australia and New Zealand see a Zero Trust approach as the future of their firms’ security. However, one in six (17%) had yet to start implementing any kind of Zero Trust program. What’s holding these businesses back, and how can they address that?

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →