SolarWinds announces updates to web performance monitoring products
With the improved functionalities, technology professionals managing every type of environment can monitor website availability and performance.
Banking malware grows 50% while cryptominers decline – Check Point
Understanding VMware in just 4 minutes
CIOs – here’s how you get your IT environment digital-ready
Limiting access key to minimising data breaches, says expert
ESET: Ignoring human element in cyber safety a mistake
Popular enterprise printers riddled with security risks
Attackers upping the ante on evasion and anti-analysis - Fortinet
Cyber-adversaries are becoming more sophisticated in their obfuscation and anti-analysis practices to avoid detection.
Security defensive blue teams failing to catch offensive red teams - Exabeam
35% of respondents claim that the blue team never or rarely catches the red team, while 62% say they are caught occasionally or often.
Cylance report looks into questionable pentesting practices
The report demonstrates how the line distinguishing pentesting exercises from actual threat actor behaviour has thinned.
ForgeRock launches open-source IoT edge controller solution
The IoT Edge Controller runs on smart edge devices, and provides the privacy, integrity and security required for devices to register as identities.
Thales launches new Gemalto Digital ID wallet
Digital ID wallet is designed to only share with third parties information that the citizen is willing to share.
Whitepaper: Managing cyber risks inherent in digital strategy
Growth, innovation and security should all be part of one conversation.
Cohesity launches new vulnerability scan using backup data
The application works by scanning backup copies on to identify any vulnerabilities across an organisation’s IT environment.
Gartner, Forrester name Retarus for Email Security
The information logistics firm was listed as one of the twelve most important providers of email security services in the world by Forrester Research.
Nintex bolstered by independent security report
Nintex Workflow Cloud’s security controls are up to scratch, with not one single instance where a security control wasn’t working, or not in place.
Fortinet integrates security fabric with Alibaba Cloud
The combination of technologies will provide extended security visibility and control from the data center to the cloud.
Small businesses unprepared for the latest wave of scams - Westpac
A report found small businesses are paying a hefty price to scammers; on average losing $38,845 and recovering much less than half.
Mobile Mentor solution lets you manage Windows 10 like a smartphone
The solution gives IT managers the ability to holistically manage all endpoints to improve security and employee experience.
Security teams spend 25% of their time chasing false positives
The report also showed that teams were also concerned about investigating actionable intelligence and building incident timelines as well as cleaning, fixing and/or patching networks.
New report considers consumer rights around personal data
“While all companies were compliant with the data access procedures required under the Privacy Act, we found that many companies failed to provide all the user data they were collecting.”
Microsoft and CyberArk lead GlobalData identity management theme
Both companies gained the highest score for the identity management theme in GlobalData’s Thematic Scorecard for the security software sector.
Cyber defence techniques in fighting advanced persistent threats
Today’s cybersecurity compliance standards are only designed to protect against elementary threats.
Cybersecurity is a growth accelerator, not a handbrake - experts
Cybersecurity is a growth accelerator not a handbrake on business – that’s one of the key messages from a group of security experts who gathered in Sydney to discuss the state of cybersecurity in Australian businesses.
Venafi announces guarantee for no certificate-related outages
Eliminating certificate-related outages within complex, multi-tiered architectures can feel like an impossible effort.
Business ransomware detections spiking - Malwarebytes
Ransomware attackers are targeting large, ill-prepared public and private organisations with easy-to-exploit vulnerabilities.
The fascinating way Microsoft is making a social impact
Microsoft is upending how tech companies approach the not-for-profit, NGO and charity sector with a revolutionary new approach
Vulnerabilities in cloud containers soar, report finds
“Cloud technology and adoption has obviously skyrocketed, so it’s no surprise that vulnerabilities within cloud technology will increase."
Keysight solution helps prevent cyber-attacks on connected vehicles
Potential issues identified post-production, with the risk of recalls, cost orders of magnitude more to repair than when found during pre-deployment testing.
Whitepaper: Breaking down cloud migration’s critical components
Addressing aging infrastructure and delivering cost savings across current IT environments ranked are the two leading objectives for cloud migration.
67b emails rejected due to 'highly malicious attack techniques'
Out of 160 billion emails analysed, 42% were rejected.
Cybersecurity companies bring advanced encryption and quantum tech to Aus
“This is an outstanding example of world leading Australian cyber security research and development being commercialised to our domestic market and demonstrating its importance to export markets.”