Just 6,000 accounts responsible for over 100,000 email attacks - report
Barracuda has today released a report detailing how 6,170 malicious accounts that use Gmail, AOL, and other email services were responsible for more than 100,000 business email compromise (BEC) attacks on nearly 6,600 organisations.
Trend Micro launches cloud solution for Microsoft Azure
Fortinet holds position as fastest-growing SD-WAN vendor
VPN vulnerabilities pose serious risk to OT Networks
Cloud breaches set to increase in velocity and scale - Accurics
One Identity & Ping Identity join forces on identity management
Almost 10,000 unsecured databases with more than 10 billion credentials exposed
Tanium and Google Cloud bring greater security to distributed IT
“This joint solution with Chronicle gives Tanium customers access to massively scalable analytics and investigation capabilities far beyond that of other endpoint detection and response point tools."
Nine developer enablement practices to achieve DevOps at enterprise scale
Senior software engineering leader with experience at multiple Fortune 500 companies shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.
Malware attacks abusing machine identities grew eightfold over the last 10 years - report
"Machine identity capabilities have become commoditised and are being added to off-the-shelf malware, making it more sophisticated and harder to detect."
Forcepoint Dynamic Edge Protection delivers data-centric SASE solutions
The Dynamic Edge Protection suite includes new cloud security gateway and private access offerings through its SASE solution architecture.
In the world of IT strategies, data resilience is among the most critical
The value of data in 2020 cannot be overstated, with some businesses facing catastrophe if subject to a breach. Here's why having a robust strategy to prevent this is crucial.
7 VPN services leaked data of 20 million users - report
"The report calls into question the providers’ security practices and dismisses their claims of being no-log VPN services."
Addressing the knowledge gap in the Australian security industry
Nowadays, access control can be combined with video and alarm systems, which can, in turn, link up with licence plate recognition, audio and facial solutions.
Take security awareness training to the next level
Decision makers say leaders are normalising security, but employees say they're wrong.
AWS launches fully-managed fraud detection service
Businesses lose billions of dollars to online fraud every year, however businesses respond by investing in cumbersome fraud management solutions that often rely on hand-coded rules and are difficult to keep up to date.
Major changes to Australian internet legislation needed says report
We look at the a recent indepenedent report into the controversial legislation that Australian Security agencies use to intercept digital communications
RedShield develops 'virtual shield' to protect against SAP RECON vulnerability
The vulnerability (CVE-2020-6287) could allow attackers to take over SAP systems by remotely accessing the server.
Ultimate security: The best authentication just got better
Cloud applications can hold sensitive data, and top-notch authentication is key. But having separate tools for separate applications can be cumbersome - here's how to overcome that.
How to prioritise metrics as an e-commerce CTO
E-commerce technology leaders need to track, analyze, and act on large volumes of business and system performance data. Danny Miles, the CTO of Dollar Shave Club, shares a powerful framework for thinking about and prioritizing e-commerce metrics
Fortinet's Secure SD-WAN - empowering remote workforces
Secure SD-WAN supports remote workforces, simplifies management and helps ensure business continuity.
Remote workforces can be a security hazard - but they don't have to be
Many companies have adjusted to a new reality: a workforce working from home. These workers need access to applications and files that sit inside the enterprise network, all while prioritising security. Here's how it can be done.
DDoS attacks surge 542% amidst COVID-19 pandemic - report
Generally considered the “off season” for DDoS attacks, researchers attribute the surge in incidents to malicious efforts during the COVID-19 pandemic.
Video: 10 Minute IT Jams – Attivo Networks on threat detection using deception
Attivo Networks is a US-based technology vendor in the cybersecurity space. The company focuses on threat detection and deception.
The dos and don'ts of protecting a remote workforce
This exclusive monthly webcast series explores all of the possible security pitfalls of working remotely, and the best solutions to use to avoid falling victim to them.
Network visibility: Why TAPs reign supreme compared to SPAN ports
TAPs are hardware components that connect into the cabling infrastructure to copy packets for monitoring purposes. So why are they better than SPAN ports?
Interview: Acronis co-founder on going all-in for DLP
Data-loss prevention (DLP) strategies are a cornerstone of wider cybersecurity ecosystems, especially to counter the risks of remote working. Acronis co-founder Stas Protassov explains its significance and why it acquired a DLP powerhouse.
Security teams face mounting stress, call for execs to step in
“With more organisations operating under remote work conditions, the attack surface has broadened, making security at scale a critical concern. This is a call to action for executives to prioritise alleviating the stress."
Why answering the question of orchestration vs automation will improve your security effectiveness
Organisations are looking to improve their security operations effectiveness, efficiency, and staff satisfaction, with security, orchestration, automation and response (SOAR) fast becoming a trending approach.
Rapid response: The best way to detect and respond to traffic anomalies
Metadata is a must-have security practice that allows analysts to parse through more devices, more communications and more data in less time.
Three common pitfalls to avoid as pandemic accelerates Australian cloud adoption
Outlining three of the key risks involved with cloud computing, as well as strategies for how to mitigate against them.
True SASE. True zero trust. True cloud.
Secure Access Service Edge (SASE) is the new way of unifying security. Use the combined power of threat protection and data loss prevention to protect data, users, and systems safe when people are now working from almost anywhere.
42% more plaintext HTTP servers than HTTPS counterparts - report
Rapid7 has released a report detailing the changing internet risk landscapes of 2020, and other issues facing cybersecurity teams.
80% of security breaches involve exposure of customer data - IBM
The new report from IBM indicates that 80% of surveyed organisations reported having exposed customers’ personally identifiable information (PII) as a result of a breach.
Why there's a huge push for NFV in today's enterprises
To help networking and IT professionals better understand the opportunities and challenges associated with deploying NFV technology, new research based on responses from more than 1,300 IT and networking professionals from around the world is now available.
Acclimation signs reseller partnership with Protect4S
Protect4S is a certified SAP platform security solution that, alongside Acclimation, will deliver SAP security services across Australia and New Zealand.
BT launches first in series of managed security services for Microsoft cloud
“BT’s collaboration with Microsoft is expanding further to recognise the combined strength of our security offerings and deliver industry leading solutions for our customers.”
Workforce demographics and culture is changing. Management must too
The way we work is changing, and so is the make-up of the workforce. To get the best results, businesses need to take on dynamic workforce management.
CrowdStrike announces two executive hires, with aim to expand in A/NZ
The endpoint protection company says both executives will be responsible for boosting customer experience (CX) while delivering success mutually with CrowdStrike’s partner team as part of their new roles.
WhiteHawk lands 'milestone' $5.9 million cybersecurity contract
The annual Software as a Service (SaaS) contract is a milestone contract with a Tier 1 client – a key US federal government department.
Fortinet: Security as agile as your network
Jon McGettigan, Fortinet A/NZ Regional Director, explains why your network requires agile security services to fully protect your expanding ‘core and edge’ topology.
Juniper Networks inspires overarching approach to connected security
While Juniper is most well-known for its hardware products such as firewalls, routers, switches, and WiFi access points, these are all security products too.
Network intelligence is stopping a wave of DDoS misdiagnosis
Security teams already know the value of a layered defence; it’s time to add more layers, writes ThousandEyes principal solutions analyst Mike Hicks.
OkCupid website and app found to have significant security flaws
The popular online dating service has been found to have several vulnerabilities which, if exploited, could put the private data of users in danger of being stolen.
Your VPN deserves more than a username and password
Are the people logging into your networks who they say they are?
Forescout and ServiceNow advance tech partnership to protect critical infrastructure
Forescout and ServiceNow have announced they are advancing their partnership for enhanced operational technology (OT) and industrial IoT capabilities, with an aim of helping organisations to protect critical infrastructure from cyber threats.
Driving cloud cost efficiency with performance monitoring
Cloud infrastructure sprawl sneaks up on organisations through a series of individual decisions that in aggregate become inefficient. Thomas Dittmer shares how performance monitoring helped TravelSupermarket reduce cloud costs by 50%
Why data resilience strategies have become invaluable
Data is an organisation's most important asset, and surging cyber-risks threaten crucial data every day. It's why storing it securely and cost-effectively is critical for business continuity in 2020.
A third of millennials think they're 'too boring' to be victim of cyber attack
While many millennials are concerned at how their data is being used and whether they are being targeted by cyber-attackers, according to Kaspersky any potential action taken to tighten their online security is at ‘the bottom of their to-do list’.