back to top

Trending Content:

Key Findings within the ASX 200: A Sneak Peek at Our In-Depth Report | Cybersecurity

In as we speak’s quickly evolving digital panorama, managing cyber danger has turn out to be important for sustaining company progress and resilience. Cyber danger administration requires balancing company progress in opposition to the evolving ways of menace actors and governmental rules – a frightening process that requires steady measurement and strategic reflection. Our newest report, State of Cybersecurity 2024 | ASX 200, examines these elements throughout Australia’s largest firms, figuring out technological components that relate to recognized threats and upcoming laws, such because the Cyber Safety Invoice 2024. By calculating a cyber danger rating primarily based on these technical elements, we go additional to check danger between firms, throughout industries, and over time.

This report is designed for these centered on strengthening Australia’s cyber defenses, together with:

Know-how implementers seeking to determine crucial danger elements and their technical controls.Executives seeking to benchmark their organizations in opposition to friends listed on the ASX or requirements just like the Protecting Safety Coverage Framework.Coverage makers seeking to perceive the important thing dangers impacting Australian industries and important infrastructure.Obtain the ASX 200 report.

On this 12 months’s report, we make the most of information from Cybersecurity’s proprietary scanning expertise to determine areas of vulnerability throughout the ASX and with particular industries. Some highlights embrace:

Over 50% of ASX firms present varied points with TLS connections for encrypting visitors, like weak ciphers that “nation-state and sufficiently resourced actors are able to exploit”, expired certificates, or just no encryption in any respect. TLS is a well-established greatest observe, and gaps in TLS implementation have a powerful correlation with safety incidents. 46% of ASX 200 firms lack DMARC, an e mail authentication technique used to forestall phishing. In Might 2024, the U.S. Division of State reported that North Korean teams had been actively exploiting organizations with insufficient or non-existent DMARC insurance policies. General, we observe enhancements within the cyber danger scores of ASX 200 firms and of their trade groupings, however this sample just isn’t common. For every trade, we spotlight the businesses which have improved or declined probably the most. Notably, one of many two industries to point out a collective decline is Utilities – a part of Australia’s important infrastructure lined by the upcoming Cybersecurity Invoice. 

Along with the chosen key findings, the report offers an intensive evaluation of every of the 11 industries – how they examine to one another, their year-over-year efficiency, which safety domains contribute probably the most to their danger rating, and detailed scoring for one of the best and worst performers. 

These firms not solely signify the most important focus of capital in Australia, but in addition signify key distributors for different companies and customers. By highlighting each strengths and weaknesses, we goal to advance the shared mission of enhancing Australia’s cyber resilience.

Obtain the report as we speak.

6307c1cb17c464050009ab77 Pattern Dark6307c1cb17c464050009ab77 Pattern Dark

Able to see Cybersecurity in motion?

Prepared to save lots of time and streamline your belief administration course of?

6307c1cb17c464050009ab77 Pattern Dark6307c1cb17c464050009ab77 Pattern Dark

Latest

West Palm Seashore’s 50 Latest Listings: August 29, 2025

West Palm Seashore is working cooler proper now. The...

Shopping for a Quick Sale vs Foreclosures: What’s the Distinction and Which is Higher for You?

Key take aways:  Quick gross sales typically have higher circumstances...

Las Vegas’s 50 Latest Listings: August 29, 2025

Bathed in desert solar and buzzing with year-round leisure,...

Kansas Metropolis’s 50 Latest Listings: August 29, 2025

Set alongside the Missouri River with a vibrant tradition...

Newsletter

Don't miss

Fostering a Canine for the First Time? Listed below are 7 Methods to Put together Your Residence

For those who’re fostering a canine for the primary...

15 KPIs & Metrics to Measure the Success of Your TPRM Program | Cybersecurity

Monitoring key efficiency indicators (KPIs) will enable your group...

Assembly the Third-Get together Danger Necessities of the CCPA | Cybersecurity

The CCPA closely regulates using any information that might...

20 Thanksgiving Scents to Welcome the Vacation

As the vacation season approaches, there’s no higher solution...

High 7 SaaS Safety Dangers (and How you can Repair Them) | Cybersecurity

Trendy organizations are growing cloud adoption to reap the operational advantages of outsourcing essential enterprise features. A 2021 research discovered that 90% of surveyed...

Jira Safety Vulnerability CVE-2019-11581 | Cybersecurity

On 10 July 2019, Atlassian launched a safety advisory for a crucial severity vulnerability in most variations of Jira Server and Jira Knowledge Middle....

How Do You Carry out a Provider Danger Evaluation? | Cybersecurity

When selecting a provider to companion with, organizations must carry out their due diligence and assess the cyber dangers related to every specific provider...

LEAVE A REPLY

Please enter your comment!
Please enter your name here