Gartner names Ping Identity leader in access management
The solution includes authentication and single sign-on, MFA, access security, directory, intelligent API security and data governance capabilities that work together.
DDoS attacks on the rise despite taking a summer break
Cyber defence techniques in fighting advanced persistent threats
How you can leverage cloud’s advantages while staying secure
Attackers upping the ante on evasion and anti-analysis - Fortinet
Nintex bolstered by independent security report
Unsecured WiFi leaving schools vulnerable to attack
Puppet launches vulnerability remediation product
With vulnerabilities and security breaches on the rise, the latest Puppet product helps IT teams find, prioritise and remediate vulnerabilities.
67b emails rejected due to 'highly malicious attack techniques'
Out of 160 billion emails analysed, 42% were rejected.
SolarWinds announces updates to web performance monitoring products
With the improved functionalities, technology professionals managing every type of environment can monitor website availability and performance.
Genetec shows impressive growth, says IHS Markit
IHS has named Genetec one of the fastest-growing access control software manufacturers in the world, according to the latest IHS Report.
New research highlights third party risks facing organisations
modern risk management must account for ongoing changes in third-party relationships and mitigate risks in an iterative way — that is, on a continual basis, rather than at specified intervals."
Ping Identity launches private cloud identity solution
Enterprises need a dependable way for customers, employees and partners to conveniently sign-on to their services and applications.
Rubrik enters data governance and disaster recovery orchestration market
Sonar addresses the intensifying risk of data privacy breaches and compliance penalties by applying machine learning to discover sensitive data.
Whitepaper: Managing cyber risks inherent in digital strategy
Growth, innovation and security should all be part of one conversation.
Microsoft and CyberArk lead GlobalData identity management theme
Both companies gained the highest score for the identity management theme in GlobalData’s Thematic Scorecard for the security software sector.
Security defensive blue teams failing to catch offensive red teams - Exabeam
35% of respondents claim that the blue team never or rarely catches the red team, while 62% say they are caught occasionally or often.
ForgeRock launches open-source IoT edge controller solution
The IoT Edge Controller runs on smart edge devices, and provides the privacy, integrity and security required for devices to register as identities.
Limiting access key to minimising data breaches, says expert
"When a company provides only a minimum amount of access needed for the employees to fulfil their roles, the risk of wide-spread breach greatly diminishes."
HCL - the Global IT company with a growing A/NZ presence
We look at the local role of the massive corporation in ANZ IT departments.
Mobile Mentor solution lets you manage Windows 10 like a smartphone
The solution gives IT managers the ability to holistically manage all endpoints to improve security and employee experience.
Rackspace: Bridging on-premise and cloud workloads
The VMware Cloud on AWS solution is crafted through deep integration of VMware virtualisation and cloud management tools with the AWS cloud platform.
Whitepaper: Breaking down cloud migration’s critical components
Addressing aging infrastructure and delivering cost savings across current IT environments ranked are the two leading objectives for cloud migration.
Broadcom set to own Symantec’s enterprise security business for $10.7B
"M&A has played a central role in Broadcom's growth strategy and this transaction represents the next logical step in our strategy following our acquisitions of Brocade and CA Technologies," says Broadcom CEO
Kaspersky opens first Transparency Center in APAC
The company’s third code review facility will be located in Malaysia’s Cyberjaya, alongside key cyber-related government agencies and companies in the country.
OutSystems gains new certifications for cloud security compliance
These certifications demonstrate the level of commitment OutSystems has to ensuring the privacy and protection of its customers’ data in the cloud.
Check Point: Attackers executing commands remotely with latest malware
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
Jamf extends Apple expertise through security firm buyout
IT and Apple specialist firm Jamf has acquired Mac-focused endpoint security provider Digita Security.
Cybersecurity companies bring advanced encryption and quantum tech to Aus
“This is an outstanding example of world leading Australian cyber security research and development being commercialised to our domestic market and demonstrating its importance to export markets.”
Understanding VMware in just 4 minutes
We look at the companies history and key technology solutions.
Cylance report looks into questionable pentesting practices
The report demonstrates how the line distinguishing pentesting exercises from actual threat actor behaviour has thinned.
Keysight solution helps prevent cyber-attacks on connected vehicles
Potential issues identified post-production, with the risk of recalls, cost orders of magnitude more to repair than when found during pre-deployment testing.