Australia's leading source of security and threat news
AlgoSec integrates privileged account access security support
“With support for CyberArk, mutual customers can now take a business-centric approach to security policy."
Use a password manager? New study reveals it may be worse than useless
The study finds using a number of the top password managers is no better than putting your passwords in a text file and saving it to your desktop.
Check Point launches engagement-based partner programme
The new Check PointS partner programme directly rewards solution providers for activities that deepen customer relationships such as C-suite meetings.
SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
D-Link A/NZ launches new home wireless surveillance kit
The Omna Wire-Free Full HD cameras and accompanying Wi-Fi Hub offer a number of new features, including Alexa/Assistant support.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.
Whitepaper: How to secure your data in a remote world
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
Frost & Sullivan: Big data is key to preventing cyber breaches
“This technology can proactively predict breaches before they happen, as well as uncover patterns from past incidents to support policy decisions."
Microsoft, DigiCert, Utimaco tackle quantum computing threats
The algorithm could bring the world one step closer to a secure internet of things.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
French cyber startup Alsid reaches out to Asia Pacific
French cybersecurity startup Alsid is setting its sights on the vast market opportunities in Asia, and Hong Kong is its initial base of choice – because it’s an attractive target for cyber attacks.
New digital world causing concern for IT auditor recruitment
Nearly 2/3s of organisations say the tech skills gap is already impacting IT audits. A new study identifies the top five skills auditors seek.
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
Four ways the technology landscape will change in 2019
Until now, organisations have only spoken about innovative technologies somewhat theoretically. This has left people without a solid understanding of how they will ultimately manifest in our work and personal lives.
Experts comment on Aus Parliament breach
Late last week, Australian security agencies reported they were looking into a security breach of the Federal Parliament’s network.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.
Whitepaper: Ransomware is evolving – how is your security keeping up?
Kaseya explores how automation and integration can help organisations stay ahead of security threats.
Threat prioritisation feature announced for Tenable platforms
Predictive Prioritisation enables organisations to focus on the three percent of vulnerabilities that have been or will likely be exploited in the next 28 days.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Whitepaper: Logging in Docker using syslog-ng
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.
Legacy applications a ‘healthcare cybersecurity nightmare’
A new whitepaper launched today that sought to bring light to just how dire the cybersecurity situation with hospitals really is.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Whitepaper: How actionable, useful log messages optimise your business
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.
Whitepaper: Business continuity in the age of compliance
Installing a continuity solution in a highly regulated industry can be tricky in this age of regulation. What are the questions you should be asking?
Avoid a game of guess who - get authentication right first time
Analyse the who, what, and where of any person, data, and environment?
Whitepaper: Remote working is great – but is it a security time-bomb?
Simply extending current PC security controls to a mobile fleet is ineffective.
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
Whitepaper: Five key ways to lock down BYOD with MFA
IT and security managers need to move beyond usernames and passwords, expanding their use of multi-factor authentication (MFA) to help provide secure and convenient access.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Facial recognition tech can identify partial images of people
We’re now at the point where technology doesn’t even need an entire image of someone to identify them.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.
Top 8 best practices to optimise the cost and performance of SIEMs
Implementing a few key best practices will help you achieve huge immediate and long-term improvements, which will be realised both in your SIEM operation and in other areas such as compliance.
Whitepaper: Ask the smart questions - choose a BC provider with care
How many specialist engineers will be available to help you during the short window you require to get your systems up and running again?
CSOs - are you prepared for cloud cryptojacking?
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.
Citrix: How adoption of cloud apps is changing IT landscapes
The pursuit of agility, productivity and workforce mobility has added more systems, applications and services to the IT network of companies.
Global security concerns have major impact on Australian firms
Consumers in Australia, Malaysia, New Zealand and the Philippines are not comfortable using digital identities to interact with commercial or financial service providers.
617 million stolen records up for sale on dark web
It may not be the first time the databases have been offered for sale.
Interview: A critical need exists for effective log management
One Identity's IT veteran Balázs Scheidler shares his insights on log management's history and where it's going to next.
Mobile security: A case of risk versus reward?
Neither restricting productivity nor accepting tremendous mobile security risk is a viable option.
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Security flaw in Xiaomi electric scooters could have deadly consequences
An attacker could target a rider, and then cause the scooter to suddenly brake or accelerate.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Whitepaper: Three quick ways security teams can unlock the executive budget
Boards and Executives who normally approve funding for IT Security speak the language of ROI, NPV, etc.
The ultimate playbook for DNS infrastructure
Advanced DNS solutions can bring legacy systems into the modern age and protect against these potentially crippling DNS attacks.
Infographic: Top security concerns driving Australian businesses
The Unisys Security Index study polled over 1,000 adults between August 19 to September 3, 2018.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
OneSpan uses AI to tackle financial account fraud
Its new solution uses machine learning to protect online and mobile channels, as well as meet compliance requirements for transactional risk analysis
Whitepaper: Uniting syslog-ng and Splunk for your needs
This guideline describes how Splunk users can benefit from syslog-ng Premium Edition features and offers guidance for configuration optimisation.
Whitepaper: Storing logs in Elasticsearch using syslog-ng
Elasticsearch, an easy-to-scale and easy-to-search NoSQL data store, has been gaining momentum as the ultimate destination for log messages.
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Massive jump in email fraud targeting healthcare - Proofpoint
The report analyses more than 160 billion emails sent across 150 countries in both 2017 and 2018 to identify email fraud attack trends.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.
The top technologies shaping future ‘proactive’ cybersecurity
Frost & Sullivan has highlighted emerging technology trends that are set to change the way enterprises protect themselves against cybercrime.