SolarWinds announces updates to web performance monitoring products
With the improved functionalities, technology professionals managing every type of environment can monitor website availability and performance.
DDoS attacks on the rise despite taking a summer break
How you can leverage cloud’s advantages while staying secure
Microsoft and CyberArk lead GlobalData identity management theme
Whitepaper: Managing cyber risks inherent in digital strategy
Keysight solution helps prevent cyber-attacks on connected vehicles
430,000 people hit with financial malware
Cohesity launches new vulnerability scan using backup data
The application works by scanning backup copies on to identify any vulnerabilities across an organisation’s IT environment.
Slack tackles balance between productivity and security
The new features include more options to protect data without interrupting employees’ requirements to get work done.
ForgeRock launches open-source IoT edge controller solution
The IoT Edge Controller runs on smart edge devices, and provides the privacy, integrity and security required for devices to register as identities.
Broadcom set to own Symantec’s enterprise security business for $10.7B
"M&A has played a central role in Broadcom's growth strategy and this transaction represents the next logical step in our strategy following our acquisitions of Brocade and CA Technologies," says Broadcom CEO
Cyber defence techniques in fighting advanced persistent threats
Today’s cybersecurity compliance standards are only designed to protect against elementary threats.
Ping Identity launches private cloud identity solution
Enterprises need a dependable way for customers, employees and partners to conveniently sign-on to their services and applications.
Security defensive blue teams failing to catch offensive red teams - Exabeam
35% of respondents claim that the blue team never or rarely catches the red team, while 62% say they are caught occasionally or often.
Cybersecurity is a growth accelerator, not a handbrake - experts
Cybersecurity is a growth accelerator not a handbrake on business – that’s one of the key messages from a group of security experts who gathered in Sydney to discuss the state of cybersecurity in Australian businesses.
Report: Fortinet releases latest analysis of the cyberthreat landscape
Learn about the latest cyber-threat trends from the newest release of the Fortinet Threat Landscape Report, including remote desktop protocol vulnerabilities and why cybersecurity automation is part of a comprehensive cyber hygiene practice. Download it for FREE.
Genetec shows impressive growth, says IHS Markit
IHS has named Genetec one of the fastest-growing access control software manufacturers in the world, according to the latest IHS Report.
ESET: Ignoring human element in cyber safety a mistake
"We believe that when employees are aware of their potential blindspots, they are naturally more invested and better prepared to be wary of things that may not seem quite right."
Rackspace: Bridging on-premise and cloud workloads
The VMware Cloud on AWS solution is crafted through deep integration of VMware virtualisation and cloud management tools with the AWS cloud platform.
67b emails rejected due to 'highly malicious attack techniques'
Out of 160 billion emails analysed, 42% were rejected.
Rubrik enters data governance and disaster recovery orchestration market
Sonar addresses the intensifying risk of data privacy breaches and compliance penalties by applying machine learning to discover sensitive data.
Mobile Mentor solution lets you manage Windows 10 like a smartphone
The solution gives IT managers the ability to holistically manage all endpoints to improve security and employee experience.
New research highlights third party risks facing organisations
modern risk management must account for ongoing changes in third-party relationships and mitigate risks in an iterative way — that is, on a continual basis, rather than at specified intervals."
Fortinet integrates security fabric with Alibaba Cloud
The combination of technologies will provide extended security visibility and control from the data center to the cloud.
Nintex bolstered by independent security report
Nintex Workflow Cloud’s security controls are up to scratch, with not one single instance where a security control wasn’t working, or not in place.
New report considers consumer rights around personal data
“While all companies were compliant with the data access procedures required under the Privacy Act, we found that many companies failed to provide all the user data they were collecting.”
Thales launches new Gemalto Digital ID wallet
Digital ID wallet is designed to only share with third parties information that the citizen is willing to share.
Limiting access key to minimising data breaches, says expert
"When a company provides only a minimum amount of access needed for the employees to fulfil their roles, the risk of wide-spread breach greatly diminishes."
Attackers upping the ante on evasion and anti-analysis - Fortinet
Cyber-adversaries are becoming more sophisticated in their obfuscation and anti-analysis practices to avoid detection.
SentinelOne launches next-gen server protection offering
SentinelOne has released a new next-generation server and protection offering, which is purpose-built for containers.
Banking malware grows 50% while cryptominers decline – Check Point
The report’s findings are based on data drawn from Check Point’s between January and June 2019, highlighting the key tactics cyber-criminals are using to attack businesses.
Business ransomware detections spiking - Malwarebytes
Ransomware attackers are targeting large, ill-prepared public and private organisations with easy-to-exploit vulnerabilities.