Thycotic debunks top Privileged Access Management mythsPrivileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Why cybersecurity remains a top business priority
One in two Australian businesses estimated that they will receive fines for being in breach of new legislation.
AI helping businesses stay ahead of threats - LogRhythm
AI is being used to anticipate new threats and mediate and minimise the damage caused by breaches.
How organisations should prepare for cloud migration
How ready are Australian organisations for cloud migration?Download
IDC: 2019 security spending to grow 20% in APeJ
“The Asia/Pacific region recognises that its no longer “under-the-radar” as far as breaches, hacks, and legislation is concerned.”
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
Network security in A/NZ - OVH
Ensuring operations can be performed at a continuous fast pace will be vital for businesses in 2019.
Disaster alert - will your business survive?
No matter the size or industry that your business operates in, business continuity planning is critical to support resilience and uptime in the event of a disaster.Download
Whitepaper: Filling your cloud technical skills gap
The study surveys more than 950 IT decision makers and 950 IT pros from across the globe to better understand the barriers to increasing cloud usage.Download
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Flashpoint global channel strategy seeing dividends
The company’s channel-driven revenue has also grown more than 200% since it signed its first partner in 2015.
Why multifunction devices need biometric security
PINs, or ID badges on card readers are important basic measures, but can still leave information vulnerable in the case that they’re lost, stolen, or copied.
Ransomware declining, but businesses must still be on guard – ExtraHop
Speed and effectiveness are part of the reason for ransomware’s ongoing appeal to the unscrupulous.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.Download
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.Download
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
It's neck-and-neck: The race between security and innovation
Rackspace will help you uncover more about the contradiction within Australian businesses and most importantly, how to solve it.Download
Thales completes 15-month Gemalto acquisition
The combination creates a portfolio of digital identity and security solutions based on technologies such as biometry, data protection, and, more broadly, cybersecurity.
Millions of Facebook user records exposed in latest data leak
UpGuard reported that each of the data sets was stored in its own Amazon S3 bucket configured to allow public download of files.
Experts and execs comment on Facebook data leak
“Tech companies are the custodians of user credentials and other personally identifiable information, a valuable resource in today's world.”
Okta launches $50mil fund to fuel identity solutions startups
The fund will seek out startups that are aligned with Okta's vision of enabling any organisation to use any technology.
Why businesses are failing at cybersecurity
Email is the number-one vector used to initiate attacks like malware delivery, impersonations and phishing attacks.Download
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
Streaming services prime targets for credential stuffing attacks
Video and streaming services are prime targets for cyber attackers who attempt to conduct credential stuffing attacks, according to new research from Akamai.
NSW to give cybersecurity SMEs R&D gift cards
SMEs in NSW can apply for a ‘cyber voucher’ which will connect them with cybersecurity research teams from one seven universities.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.
US students hack school WiFi network
Two high school students in the United States were arrested for allegedly hacking their school’s WiFi network to avoid taking a test, proving that education institutions still have work to do when it comes to securing their networks.
WikiLeaks' Julian Assange arrested in London
There’s little doubt that it’s a day of reckoning for WikiLeaks cofounder Julian Assange today, after his seven-year long protection inside London’s Ecquador Embassy came to an abrupt end.
Network security providers dominate cybersecurity - Canalys
Cisco, Palo Alto Networks and Fortinet, all with a strong focus on network security products, outperformed the market, recording strong double-digit growth.
Risky business: Avoid putting all your eggs in one basket
Many businesses that transition to the cloud blindly rely on a single cloud service provider for day-to-day security.
Awareness but no action – AU firms exposed to security, compliance threats
Security managers know the many ins-and-outs of security best practices and employees’ everyday behaviour, but few are doing anything to fix security issues.Download
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.Download
Fortinet drives security-based networking with new SD-WAN offerings
At Fortinet Accelerate 2019 in Orlando, the company unveiled its SD-WAN solutions, including what it calls the industry’s first SD-WAN ASIC.
Eaton brings the world’s first UL certified UPS network card to A/NZ
The launch marks the expansion of Eaton’s cybersecurity program and collaboration with global safety science organisation UL.
85% of organisations struggling with access management – Thycotic
More than 50% of the organisations surveyed said privileged accounts never expire or get deprovisioned.
Whitepaper: Business continuity in the age of compliance
Installing a continuity solution in a highly regulated industry can be tricky in this age of regulation. What are the questions you should be asking?Download
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.Download
Honeywell launches online enterprise app store
The Honeywell Marketplace provides direct access to enterprise mobile apps, enabling software vendors to directly engage customers and collaborate with other developers.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.Download
Five ways to strengthen email security - Barracuda
Organisations need a defence posture that is able to detect and prevent attacks before they cause harm.
WatchGuard takes to the cloud with new platform
The platform delivers multi-tier and -tenant capabilities, scaling automatically to allow MSPs to create and manage unlimited customer accounts.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Bromium uncovers major malware distribution centre
Over a dozen US-based web servers from far-right linked hosting service are being used to target businesses with mass phishing campaigns spreading malware.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.Download
MSSPs for dummies - all you need to know about multicloud security
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. A lot is at stake and yes, you should be cautious.Download
Okta announces security layer for on-prem apps
For many organisations, the present and the future will be hybrid, with mission-critical applications residing both on-premises and across multi-cloud environments.
Survey shows organisations in the dark about shadow mining threat
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
Combat converged IT and OT security risks - Forescout
At specific risk are healthcare organisations, manufacturers, energy providers, and any business where building management technology is part of the IT network.
Loki registers as the first Australian not-for-profit privacy firm
Privacy Network Loki claims it is now Australia’s first privacy software not-for-profit organisation – and the timing couldn’t be better as the country grapples with new encryption laws and new ways to secure privacy rights.
Fortinet's bid to close the cyber skills gap
A comprehensive training and education strategy must include strategic partnerships within government, academia and NGOs.
Aruba announces new automated IoT security solutions
When addressing their IoT strategies, organisations globally are faced with new security and connectivity challenges.
Whitepaper: Five essential steps to protect your company’s critical data
The increase in devices being used by employees and the number of cloud apps necessitate multiple different channels of accessing a company’s information in a secure manner.Download
Aura Infosec discovers major Mozilla Firefox vulnerability
Alex Nikolova made the discovery while conducting a research project on the same-origin policy of various web browsers.
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.Download
Interview: Uber's CISO reveals lessons learned from breaches
Uber’s chief information security officer John ‘Four’ Flynn has a career history that many technologists could only dream of.
AlgoSec launches security and compliance management for multicloud
CloudFlow’s centralised management gives organisations visibility, risk and compliance analysis, and automated detection of misconfigurations.
Yahoo proposes US$117.5m breach settlement - but will it be enough?
Judge Lucy Koh must decide if Yahoo's previous dodgy settlement tactics are forgiven in this latest proposal.
Why third-party solutions are key to realising the benefits of Office 365
Research shows ongoing security concerns about email security in Office 365.Download
Trend Micro announces security products for Google Cloud Platform, Kubernetes and Gmail
“It is critical for enterprises to remember that they share in the responsibility of what they put in the cloud.”
Security ‘not their problem’? Set them straight on cyber resilience for email
“It’s not my problem” – how often have you heard that excuse from teams outside IT security? Ideally it’s becoming less common, but there’s still an ostrich mentality within organisations.Download