Gartner names SailPoint Leader in identity governance for the sixth time
Users today encompass both human and non-human users; applications, data and infrastructure are no longer purely on-premise but largely live in the cloud today.
September’s top malware, Emotet botnet strikes again – Check Point
WatchGuard releases new ruggedised network security appliance
Cybersecurity and video surveillance – threats, vulnerabilities and best practices
Whitepaper: Designing a secure data centre from the ground up
Thales: Organisations failing to protect sensitive data in the cloud
Malware hiding on popular content delivery networks - WatchGuard
Whitepaper: Australia’s path to cloud migration
A Telsyte study forecasts the total market value for public cloud infrastructure services to reach $775 million by 2019, up from $366 million in 2015.
Disruptionware emerges as newest and nastiest cyber threat
Forescout and ICIT research has identified the rise of disruptionware and its threat to particularly operational technology environments.
Data loss prevention: Why digital images should not be overlooked
Digital images are increasingly being used as mechanisms for cyber-attacks. What can organisations to minimise risks and mitigate against this advanced threat?
IBM outlines why the 'boom' moment is key to better security
“Often I’m talking with people on the worst day of their business’ life.”
DIY or MSSP? How to tailor your security strategy to your needs
Cloud adoption is driving rapid IT transformation and an equally powerful change in the way we must evaluate the threat landscape.
Are Fortune 500 companies failing at cyber security?
"Lax security and its resulting breaches have long-term repercussions for organisations as well as their customers, shareholders, partners, and other stakeholders."
From predator to high-risk vaccine: Sophos tracks WannaCry's evolution
An analysis of around 2,000 WannaCry samples from 2018 shows they were adapted to bypass the famous kill switch, but unable to encrypt data.
Manage Windows 10 with the most simple, intuitive toolset available
Mobile Mentor’s solution comes with built-in best practice security policies, round-the-clock employee support and bundled endpoint management.
Phishing leading cause of data breaches across Australia
This indicates hackers are targeting the weakest link in the security chain – end users.
Nuance announces updates to biometric fraud detection offering
A recent Nuance survey found 1 in 4 people have fallen victim to fraud in the last twelve months, each person losing an average of $2,000 due to inefficient passwords.
This is what our kids will hate us for: IoT devices 'asbestos of the future'
"The proliferation of stupid internet-connected smart devices will be the IT asbestos of the future.
Seven experts talk security automation & analytics
"It all comes back to understanding your capabilities, building your playbooks, and finding a tool that can help you automate. That’s the path you have to go take, because without automation, you’re an easy target.”
Cloud-native breaches vastly different from legacy malware attacks - McAfee
The report uncovered that 99% of misconfiguration incidents in public cloud environments go undetected, exposing companies to data loss.
Optimising applications for the modern workplace
An organisation’s ability to combine and connect legacy and SaaS enterprise applications, clouds, mobile apps and internal processes determines whether it soars or stumbles.
Connected medical devices to drive cybersecurity market
The market for cybersecurity solutions will experience a marked increase in value over the next two years, due in part to a need for connected medical devices to have better security.
E-book: Ten steps to automate network security
The modern cybersecurity landscape is continually evolving with new, sophisticated malware and attack techniques that threaten enterprises on a massive scale.
Sophos launches managed threat response service
The resellable service provides organisations with a dedicated 24/7 security team to neutralise threats.
Enterprise incident response plans suffer from neglect – Verizon study
Incident response plans may be a useful part of cyber-preparedness, but they’re of little use if security teams don’t review, test or update those plans on a regular basis.
Most organisations exhibiting malicious RDP behaviour - report
Remote Desktop Protocol is a vital tool for managed service providers (MSPs) in their management of hundreds of client networks and systems.
How businesses walk the line between information sharing and cyber risk exposure
Research has uncovered tension between what organisations seek to achieve through their digital transformation efforts and their concerns about the risks created by their ambitions.
Canberra Cyber Security Innovation Node launches
The Canberra Node is a part of the National Network of Nodes, which accelerates cyber capability development and innovation across Australia.
WatchGuard releases cloud-based service to automatically block phishing attempts
DNSWatchGO aims to fill security gap beyond the network perimeter, as new research shows 64% of remote users have fallen victim to a cyber-attack.
DXC Connect named ExtraHop’s 2019 Breakthrough Partner
DXC Connect has built out a major service offering focused on the ExtraHop suite of cloud-native network detection and response (NDR) solutions.
Online users giving out social media details too freely - Kaspersky
The survey revealed that online users in Asia Pacific appear to be willing to share their private information in exchange for various personal gains from social media.
Thales announces expanded access management capabilities
New adaptive authentication, single sign-on and application visibility capabilities have been made available for Thales SafeNet Authentication Service customers.