Local governments need to act to protect privacy of citizens
"We are seeing a real-world effect of technology creep on our privacy rights in Australian cities through the rapid expansion of surveillance technology in public spaces."
Venafi uncovers suspicious retail lookalike domains using valid certificates
ConnectWise acquires Continuum and ITBoost
Is an MSSP really a safe bet?
Breaches on the rise despite increased security spend, survey finds
Whitepaper: Biggest barriers to cloud success to conquer them
NordVPN launches encryption tool, password manager to come
Gartner names Zscaler Leader in secure web gateways
The Zscaler platform processes more than 70 billion transactions and detects approximately 100 million threats per day across 185 countries.
Microsoft's new security innovations at Ignite 2019
Microsoft 365 and Security corporate vice president Kirk Koenigsbauer outlined 10 major security announcements across Azure, Microsoft 365, Office, and Microsoft Defender ATP.
Singapore to make acquaintance with Group-IB’s CyberCrimeCon
The event will include world-leading threat hunters, cybersecurity researchers, C-suite executives, and even representatives from the likes of INTERPOL and CSA Singapore.
Threat alerts in Australia on the rise but majority are fake - Cisco
The study interviewed almost 2,000 security professionals, 209 of which were Australian CISOs.
The rise of the Neobanks: How they challenge traditional banking
Neobanks are catering to customers who are tired of the big banks and those who seek alternatives, says financial advisory firm Mozo.
Securing IoT top priority for enterprises, research says
Developing and managing secure IoT deployments is no longer the remit of security professionals but is a capability that is quickly becoming available to developers of all levels."
Whitepaper: How advanced persistent threats are making threat prevention obsolete
The ability to persist has made the whole idea of prevention obsolete.
Volpara Health integrates Tenable into DevSecOps program
Volpara Health Technologies has chosen Tenable as its Cyber Exposure solutions provider to manage, measure and reduce cyber risk in its DevSecOps program.
Whitepaper: The state of play of A/NZ cybersecurity
There’s no denying the cybersecurity challenges: lack of skills, compliance and the changing threat landscape are just the tip of the iceberg.
Whitepaper: How AU businesses perform in cloud migration and readiness
Australia is regarded as a ‘cloud mature’ country and many CIOs know the cloud is a more agile, faster and cheaper place to be.
Tensions are high: Innovation or cybersecurity?
This research uncovers tensions, concerns, and how to solve them.
Whitepaper: Businesses attracted to hybrid cloud, but conscious of risks
Discussion participants cited ageing applications, the risk of moving inappropriate workloads to the cloud and the complexity of multi-cloud, hybrid cloud architectures as key issues to address.
Why supply chain companies should adopt cloud-based communications
Here are 8x8’s five reasons cloud-based communications applications will improve productivity and support growth for Australian transport and logistics businesses.
Quantum computing will pose risks to enterprise encryption
“It is encouraging to see that so many companies understand the risk and challenges that quantum computing poses to enterprise encryption."
Google Cloud sets sights on network intelligence automation
Google Cloud’s new network intelligence platform could potentially automate thousands of networking jobs and speed up cloud migrations to new levels of efficiency.
Attacks on IoT devices booming, research finds
“As people become more and more surrounded by smart devices, we are witnessing how IoT attacks are intensifying."
Fortinet buys out enSilo to bolster endpoint security portfolio
Fortinet has acquired a US-based endpoint security company enSilo as the company continues to flesh out its global security solutions.
Securing the unknown with visibility and control
What’s getting in the way of an organisation’s security health and what needs to happen to secure those vulnerabilities? What assets does an organisation own? How does an organisation gain visibility? Where do the assets live? Who has access to those assets?
Whitepaper: Juniper Networks put to the test in malware attacks
With a multitude of solutions on the market, ESG decided to use malware attacks to evaluate market solutions like Juniper Networks’ automated threat detection and remediation.
Patching: Reducing the gap between exposure and remediation
On average, it takes an organisation 90-120 days to deploy a patch to their devices, which is too big a gap between a patch being released and it being deployed.
Barracuda Networks integrates WAF into cloud platform
Barracuda Networks announced a new Cloud Application Platform (CAP), which provides security, as well as a new web application firewall (WAF) as a service solution built on Microsoft Azure.
Enterprises look to zero trust network access to thwart VPN attacks
“Though it is encouraging to see so many organisations are pursuing ZTNA to close gaps created by VPNs, I am surprised that more than half of those surveyed believe their current infrastructure is reliable enough to protect the enterprise."
The human eye as a proxy for the future of networking
In recent years scientists have been unravelling the intricate structure and wiring of retina neurons within the eye - Mellanox Technologies looks beneath the surface.
Time to give your security setup an end-of-year clean?
ExtraHop reminds businesses that ‘tis the season embark on the annual end of year clean: garages, closets and cybersecurity settings.
In focus: Real-world stories about security automation
"That’s the path you have to go take, because without automation, you’re an easy target.”