Quantum computing in the telecom sector and more cybersecurity trends
According to a new report, quantum computing will be a destabiliser for the telecom sector, making PKI obsolete in the near future.
IT spread in organisations good for business, bad for security
Critical lessons businesses can learn from Huawei - Memset
How to safely balance the risks and gains of innovation vs security
Log management best practices for privacy compliance
Risk management: Are CTOs setting the wrong priorities?
Meeting the card payment industry’s compliance requirements - Kemp
'Visual hacking' a privacy risk to business travellers
While 8 out of 10 business travellers consider visual hacking a threat, they don’t do much about it.
Whitepaper: The cost of cloud expertise
Rackspace’s report explores the importance of expertise to an organisation’s cloud evolution and the impact the current technical skills gap is having on businesses.
HPE announces new offerings to drive intelligent edge adoption
New IoT and edge offerings and a partner program are aimed at accelerating the deployment of personalised digital experiences and smart operations.
Report: The murky world of malicious AI
"Imagine getting a video call from your boss telling you she needs you to wire cash to an account for a business trip that the company will later reimburse. DeepFakes could be used in incredibly convincing spear phishing attacks."
The hidden cyber guardian behind Australian schools
We look under the hood at a home grown Australian cyber security company who focuses on the school market.
Fortinet increases 5G security capabilities
With the increased adoption of 5G, mobile network providers will become secure business enablers.
Using syslog-ng to take log classification one step further
Log messages will be critical to detecting security incidents, operational problems, policy violations.
Keyfactor and Thales announce integration to fight code signing cyber-attacks
Keyfactor Code Assure aims to deliver secure code signing to software vendors, mobile app developers, enterprise IT organisations, and manufacturers of IoT devices.
NBN scams conning Australians out of $110,000 every month
People aged over 65 are particularly vulnerable, making the most reports and losing more than $330,000 this year. That’s more than 60% of the current losses.
How to discern useful business intelligence from log message noise
To derive actionable, valuable business information from raw log data, it is necessary to collect, filter, and normalise messages from various sources.
Is it possible to enjoy container agility and be secure?
In line with ever-changing demands on IT, containers are exploding in popularity and look set to become the preferred method for deploying applications.
Whitepaper: The fundamental blocks of SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.
How flexible identity systems support mobile working – Ping Identity
Increased time outside of the official workplace has become the reality of working life for employees in a rapidly digitising economy.
Radiflow launches OT MSSP partner programme
The company provides a framework for MSSPs to offer new OT cybersecurity services.
Check Point launches cloud security analytics solution
CloudGuard Log.ic detects cloud anomalies, blocks threats and intrusions, and delivers context-rich visualisations.
How to configure syslog-ng in a Docker infrastructure
Whether it's user activity, performance metrics, network traffic or any other log data, syslog-ng can collect and centralise log data.
LogMeIn expands cloud identity capabilities with new offerings
Many small and medium-sized companies don’t have the resources to implement robust security programs.
Facebook jumps on the cryptocurrency bandwagon
Launching in 2020, Calibra and Libra may shake up the mobile payment industry.
Cyber attacks on healthcare companies growing
“The potential, real-world effect cyberattacks can have on healthcare organisations and patients is substantial.”
Are businesses spoiled for choice when it comes to their security options?
"Businesses need to understand which of the myriad available solutions will deliver real results."
Organisations spending more as cyberattacks increase
"Despite our remote location, Australia has not escaped the impact of some major global ransomware attacks in the last 12 months, with many businesses falling victim."
Dark web dangers threaten world's top enterprises
“Almost every vendor offered us tailored versions of malware as a way of targeting specific companies or industries,” says researcher Mike McGuire.
Europol, FBI, Bitdefender team up on ransomware decryptor
The decryptor neutralises the latest versions of GandCrab – the most prolific families of file-encrypting malware to date.
Evaluating a SIEM’s speed and scalability
SIEMs are supposed to consume log and event information from endpoints, security devices and network flows, while providing a dashboard for analysts to drill down into events.
Druva raises $130 million to power data protection for the cloud era
Druva’s success has been fueled by the rapid growth of enterprise cloud.