Trend Micro partners with AWS to launch Australian-first automated open banking solution
“Our collaboration with AWS allows us to deliver scalable security that removes friction from procurement, the devops lifecycle, and day-to-day operations.”
APAC parents hide internet activity from children more than cyber attackers
Your VPN deserves more than a username and password
Device authentication services to reach $8.4 billion by 2026 in response to IoT cybersecurity
RPA improves bottom line for Australian organisations
Business climate stabilising for tech companies following COVID crisis - report
Former Salesforce, Microsoft security exec to lead Zoom security team
Think your emails are safe from cybercriminals? Think again
In the coming year, only 60% of organisations believe an attack will come from an email - but the reality is much different.
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.
'Digital workers' give Australian firms a hand
We're not talking about tin robots here, but rather the power of robotic process automation.
Networks integrate threat awareness for stronger cybersecurity
Security threats can be challenging to address, but you can build more awareness into your networks.
Research: Rapid growth of embedded security market inevitable
With the rise of IoT, as cybercriminals find new ways to gain access to devices, new secure embedded hardware can block their points of entry.
The make or break moment: How fast can your security team mitigate threats?
For anyone in the race to detect and respond, it isn’t a choice whether to use PCAPs or metadata capture. Here's why.
How to deploy containerised apps in your cloud infrastructure
Move your business into the future - take advantage of a free consultation to pinpoint how container-based applications can propel your cloud infrastructure to new heights.
New channel leader for LogicMonitor APAC
Swapnil Shah heads to LogicMonitor after holding key roles at global systems integrators Infosys and Tech Mahindra.
Ultimate security: The best authentication just got better
Cloud applications can hold sensitive data, and top-notch authentication is key. But having separate tools for separate applications can be cumbersome - here's how to overcome that.
Interview: Checkmarx on the state of software security in Asia Pacific
"While the benefits of software are obvious, this proliferation also creates a massive and ever-evolving attack surface,” says Checkmarx A/NZ country manager Raygan Flores.
Mythbusting time: Security doesn't actually impede workforce productivity
Cybersecurity requires not only technology, but a security culture in your workforce.
Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy
Okta, CrowdStrike, Netskope and Proofpoint have joined forces to develop and launch an integrated, zero trust security strategy, stating that this is crucial for today’s digital and remote working environments.
MEF grants 3.0 SD-WAN certification to Fortinet
MEF has recently certified Fortinet’s Secure SD-WAN offering as being able to support MEF 3.0 SD-WAN services.
Cyber attacks keeping business leaders up at night, new research finds
Data breaches and insider threats are keeping organisations up at night, according to new research from KnowBe4, the security awareness training and simulated phishing platform.
Phishing attack exploited Samsung, Adobe servers for Office 365 credentials
The campaign used seemingly credible web domain names to lure its victims and bypass security filters, including from Oxford University, Adobe and Samsung.
Cyber threat intelligence reaching maturity in organisations worldwide
Cyber threat intelligence is reaching a state of maturity and integration in organisations across the globe, according to a survey by the SANS Institute and ThreatQuotient.
57% of IT professionals say their organisation uses NFV
Enterprise networks must support a growing number of distributed functions as well, which means there is more complexity and possibly skyrocketing Capex costs.
Keyfactor and Primekey announce partnership to automate PKI
“PrimeKey and Keyfactor share a mutual respect and mission to provide trust and security in zero-trust networks and manufacturing environments.”
CrowdStrike recognised as leading endpoint security vendor on global scale
IDC's report shows that CrowdStrike demonstrated a 2018-2019 growth rate of 99% and close to doubled its market share, while the market shares of the top three vendors in the corporate endpoint segment declined.
Workforce demographics and culture is changing. Management must too
The way we work is changing, and so is the make-up of the workforce. To get the best results, businesses need to take on dynamic workforce management.
Red Hat Ansible enables next generation network operations
To understand the power of a Red Hat and its IT automation ecosystem, get in touch with OSS Group.
Phishing becoming more prolific and impregnable - report
The study, conducted with VirusTotal and WHOIS XML, analysed more than 600,000 domains to accurately track malicious activity throughout the pandemic.
Network visibility powers full-throttle operation without risk
It's pedal to the metal without running risks. Not buying it? Ask the Fortune 500.
Cybercrims' web skimming strategies taint web analytics platforms
“This is a technique we have not seen before, and one that is particularly effective."
Kiwis and Aussies among most concerned globally about data privacy
New research from Genesys finds the two neighbours value their data privacy more than other regions - but, as always, there are key differences of opinions too.
Bitglass deepens integration with MFA vendor Duo Security
Bitglass has announced a deepened integration with Duo Security, now part of Cisco, as it looks to strengthen security for the modern workforce.
The real reason to use risk-based authentication in the enterprise
By analysing what the user knows, has, and does, the risk engine can identify legitimate users while denying access to intruders.
54% rise in gaming-related cyber attacks recorded in April
Social isolation measures, widely implemented throughout the world during March and April, has been linked to both the increase in engagement for gaming and a corresponding boom in game-related cyber attacks.
Businesses move to cloud-based security solutions in a bid to support remote working
Cloud-based security tools are becoming increasingly popular following the rise in remote working during COVID-19, including a marked increase in businesses using such tools to protect of corporate financial information.
Employee distraction, remote work & cyber risk - a recipe for disaster?
Moving your workforce out of the corporate office can bring big changes and potential risks in how they save their data. It is important that your IT team plan these changes with your employees.
Phishers cash in on the COVID-19 pandemic - how to avoid being reeled in
As the crisis continues to play out, the onus is on the rest of us to remain on high alert, to ensure our systems and data aren’t infected with another kind of virus.
Cybersecurity spending slumps - but swift recovery expected
New research from GlobalData found that the industry will recover after this initial slump to be worth almost US$238 billion by 2030.
Cyber attacks use LinkedIn to target companies and employees
The attacks, which ESET researchers have called Operation In(ter)ception, took place from September to December 2019 and are notable for using LinkedIn-based spearphishing.
OSS Group helps Kiwis automate to unify people & IT
The reality is, if it exists in IT there is usually a way to automate it, says OSS Group.
Remote workforces drive new risk management strategies
remote and onsite workers have access to multiple collaboration tools, leading to fresh risk management strategies in the post COVID world.
Training is essential to build cybersecurity awareness
More than ever, businesses need to ensure that all their workers have the right skills and training to protect the business from cybercrime.
Inteview: Mimecast security expert on why email attacks are more successful than ever
Techday spoke to Mimecast Australia principal technical consultant Garrett O’Hara, who walks through why security experts are becoming increasingly pessimistic about email-borne attacks.
Illumio launches Zero Trust endpoint protection solution for our digital, remote world
“As organisations were forced to transform overnight to allow for remote work, a host of endpoint security issues that have either been ignored or invisible until now were brought to the forefront."
Banks failing customers when it comes to mobile app security
"Through these vulnerabilities, hackers can obtain usernames, account balances, transfer confirmations, card limits, and the phone number associated with a victim's card.”
Airlock Digital seeks to empower Aussie SMEs with AustCyber funding
“With more SMEs and other organisations looking to adopt application whitelisting as a primary cyber defence mechanism, we plan to significantly expand Airlock Digital's partner network."
Strengthen the weakest link in your security chain
Globalisation. Remote working. High-turnover workforces. These factors and more add up to make increasingly dynamic workforces - and without proper management, your business could fall behind.
Surge in encrypted malware prompts warning about detection strategies
“If you are not decrypting and scanning your secure web connections, you are likely missing a large majority of malware,” the report states.