Read Time:1 Minute, 58 Second

Two cyber security experts from the University of New South Wales (UNSW) are working closely with an Australian-based Cyber Management Decision System to develop a new model that may help businesses guard themselves against evolving cyber-attacks.

Avertro, an Australian-based company, was founded in 2019 after founder and CEO Ian Yip sought to respond to the challenges of evolving cyber crimes. The company moved on to become the world’s first cyber management decision system (MDS) that helps leaders manage cyber attacks.

According to the company, “Focusing on the business representation of cybersecurity and building a permanent bridge to translate cyber in a normalised way, our SaaS platform helps leaders elevate their game by explaining cybersecurity to executives, forecasting outcomes, right-sizing spend, and validating their strategy so they can optimise the use of external assistance and prove they are doing cyber right.”

As the threat landscape significantly changed in Australia with the recent attacks of Optus and Medibank, many experts in the industry are looking for ways to detect and defend against malicious actors. With this in mind, two cyber security experts from UNSW are developing a new model to help businesses strengthen their cyber threat intelligence.

Professor Sanjay Jha and Dr Jiaojiao Jiang call for businesses to diversify their data for cyber security threats. According to Jha, “In today’s modern world, businesses must keep up with the latest cyber threat intelligence to withstand any chance against an attack. We aim to use the latest cyber security research and translate it in a way to empower businesses to make informed decisions which will ultimately benefit the public.”

The two mention that companies usually rely on either internal or external sources when building their cybersecurity programs. They recommend that instead of relying on just one, experts should utilise both sources. Jha and Jiang also recommended that cyber security experts devise programs that listen to ‘chatter’ in social media.

According to UNSW experts, many threat actors utilise different social media channels to discuss key details about their planned attacks. Jha and Jiang noticed, “What we’ve found is that there is usually online chatter within the hacker network about potential threats before a cyberattack takes place.”

The two are working with Avertro in developing artificial intelligence designed to identify patterns of cyber threats and predict the level of risks it poses to businesses.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Previous post ‘Beware’ of Letters Claiming to Be From Telstra: Scamwatch
Next post Atlassian Blames Envoy for a Massive Data Breach, Exposing the Information of Employees