Australia's leading source of security and threat news
These search results are from across the Techday network of sites
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Why encryption causes DDoS defence headaches
Some forms of encryption technology can make identifying and blocking some threats more difficult.
A10 Networks outlines 5G strategy
A10 has production and pilot 5G deployments with carriers worldwide, and is working with others to plan for their future 5G initiatives.
SonicWall secures hybrid clouds by simplifying firewall deployment
Once new products are brought online in remote locations, administrators can manage local and distributed networks.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
Cisco expands security capabilities of SD-WAN portfolio
Until now, SD-WAN solutions have forced IT to choose between application experience or security.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
Opinion: Router security leaving major cyber exposure gap
Hardware is frequently tossed to one side upon installation and left to fester without security updates.
Trend Micro and NTT DOCOMO partner on 5G security
This solution is built upon the recently announced Trend Micro Virtual Network Function Suite (VNFS) on NTT DOCOMO's "docomo 5G open cloud."
Eight reasons to use a VPN
By keeping your actions, your identity and your geographical location a secret, you can browse the web in the knowledge that you’re not being watched.
Bitdefender expands offerings with RedSocks acquisition
RedSocks provides non-intrusive, real-time breach detection solutions and incident response services.
Frost & Sullivan: Pulse Secure among best NACs for SMB to large enterprise
The recent Frost and Sullivan 2018 Network Access Control (NAC) Market, Global, Forecast to 2022 report states that network visibility is critical.
How network visibility tools are changing the security game
Without visibility into the behaviours occurring within a network, it’s almost impossible to detect if what’s happening is out of the ordinary.
Gartner names Sophos leader in Unified Threat Management
“We develop our cybersecurity products to work together as a system, enabling our defences to be as coordinated as cyber attacks.”
WatchGuard launches multi-factor authentication solution aimed at SMBs
WatchGuard’s AuthPoint solution is a cloud service that can be deployed and managed from any location without the need for expensive hardware components.
Three reasons organizations should consider network segmentation
ForeScout says that network segmentation splits networks into specific zones, which can then enact barriers against infiltrators.
Boil that old cybersecurity problem down to the packet level, say experts
Cybersecurity is such a multifaceted affair that it can be difficult to prioritise focus, spending, and what to explain to the C-suite.
APAC ahead of US and EMEA in AI security adoption - Osterman
Companies realise they need to improve the way they manage security and policy, and they also realise that automating workflows and processes is key.
Trend Micro brings analytics to network security solution
Organisations need a way to simplify and prioritise threat information, accelerating detection and response.
Exclusive: How to intentionally build security into a network
Intent-based networking (IBN) offers an opportunity to design security objectives into the fabric of a complex network, and then enforce them.
Gigamon partners with Endace for improved network visibility
Analysts often struggle to uncover the evidence they need to quickly determine the root cause of cyber threats.
Make the pre-emptive strike against cyberattacks with threat hunting
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.