Organisations feeling inadequate against cyber threats, survey finds
"Adopting a holistic mindset is the only effective way to manage all the various types of cybersecurity threats."
Whitepaper: Key considerations to improve cost efficiency with SIEM
HID Global launches ID verification solution
Techday expansion continues with new CFOtech site
Keyfactor and Thales announce integration to fight code signing cyber-attacks
Whitepaper: The cost of cloud expertise
Axis Communications awards A/NZ partners
E-book: How to protect DNS servers and protocols
This brief volume serves as a primer of many of the common terms in DNS security you’ll run into, high-level descriptions of the threats you face, and practical solutions that you can implement right away.
How to safely balance the risks and gains of innovation vs security
The essential conflict is that if businesses allow employees and third parties to access data off-site, they’ve opened themselves up to one of the biggest security threats there are.
Native email security systems inadequate – Mimecast
In the report, 85% of the 1,025 global respondents experienced an impersonation attack in 2018.
How to avoid common mistakes when moving to the cloud
There is an opportunity to embrace both IT-led and user-led cloud services, but it’s important to do it safely.
Log management best practices for privacy compliance
Log messages are filled with personal information that require proper security in order to comply with the Privacy Amendment Act 2017.
How flexible identity systems support mobile working – Ping Identity
Increased time outside of the official workplace has become the reality of working life for employees in a rapidly digitising economy.
HID Global releases fingerprint reader in AU market
HID Global has introduced a new fingerprint reader to the Australian market, as biometric authentication becomes the fastest-growing segment in the access control market.
Whitepaper: The fundamental blocks of SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.
Whitepaper: Using syslog-ng’s pattern database to analyse log messages
Log messages can be used to detect security incidents, operational problems, policy violations, and are useful in auditing and forensics situations.
Fortinet increases 5G security capabilities
With the increased adoption of 5G, mobile network providers will become secure business enablers.
Cryptolocker malware and ransomware threats on the rise
Cryptolocker malware and ransomware is increasing at a rapid rate, with these threats rising 167% over the previous quarter.
Credentials install base set to hit 11 billion by 2023
The number of smart card shipments is forecast to increase from 618.8 million in 2018 to 732.7 million in 2023, according to ABI Research.
Europol, FBI, Bitdefender team up on ransomware decryptor
The decryptor neutralises the latest versions of GandCrab – the most prolific families of file-encrypting malware to date.
Critical lessons businesses can learn from Huawei - Memset
“Data sovereignty is important and should not just be an afterthought."
NBN scams conning Australians out of $110,000 every month
People aged over 65 are particularly vulnerable, making the most reports and losing more than $330,000 this year. That’s more than 60% of the current losses.
SecBI makes breakthrough in cybersecurity for SOCs
SecBI has extended its threat detection solution with automated response, an ingredient that has supposedly been missing from the SOAR market.
How to configure syslog-ng in a Docker infrastructure
Whether it's user activity, performance metrics, network traffic or any other log data, syslog-ng can collect and centralise log data.
Check Point launches cloud security analytics solution
CloudGuard Log.ic detects cloud anomalies, blocks threats and intrusions, and delivers context-rich visualisations.
Is the pain of resetting passwords finally over?
"It's now the role of businesses to take the responsibility off the end user, by coming up with a more intelligent strategy than a password expiry policy."
One Identity: How to mitigate the risks of spearphishing
Targeting one company rather than casting a wide net allows threat actors to take a more sophisticated approach.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.
Tenable's take on effective vulnerability assessment
The report explores how end-users conduct vulnerability assessment, what it says about overall maturity level, and it varies based on demographics.
Evaluating a SIEM’s speed and scalability
SIEMs are supposed to consume log and event information from endpoints, security devices and network flows, while providing a dashboard for analysts to drill down into events.
Is it possible to enjoy container agility and be secure?
In line with ever-changing demands on IT, containers are exploding in popularity and look set to become the preferred method for deploying applications.
Breach checking website Have I Been Pwned is up for grabs
The man behind the popular breach checking website Have I Been Pwned is stepping down from his esteemed post as sole manager of the site.