DDoS attacks almost doubled in the last year - Kaspersky
According to a Kaspersky report, Sundays are becoming an increasingly popular day to attack.
Cyber criminals exploiting coronavirus fears
Cybersecurity reporting will need to be a seamless business process in 2020
Fortinet extends integration with Amdocs to better empower service providers
Controlling eDiscovery spend, security, and cloud top priorities for enterprise legal departments
BitSight continues to grow as demand for security ratings increases
Cloud cost savings & infrastructure upgrades tick boxes in Australian enterprises
Computer vision tech market unchallenged by controversy
GlobalData reports that the global computer vision market will continue to head upwards, even in the face of fears around facial recognition.
DNA Connect signs on as nCipher’s newest A/NZ distributor
Rapid multi-cloud and IoT adoption drives deployment of data protection solutions.
Hyland snaps up blockchain credentialing firm Learning Machine
“This acquisition is a major step toward our goal of revolutionising the way organisations electronically exchange trusted records,” says Hyland president and CEO Bill Priemer.
Global doors open for indigenous tech company
A new contract is a significant further step in the expansion of Warrgambi as an organisation founded on excellence in safety, quality, operations, staff development and social inclusiveness.
Datacom expert becomes Palo Alto Networks 'Guardian'
Datacom consultant David Hull has been recognised as one of only 37 ‘Guardians’ around the world after being awarded Palo Alto Networks’ top status of CYBERFORCE Guardian.
GBG rolls out anti-fraud solutions to protect against financial crime
“To aid in that fight, GBG offers a layered digital fraud and compliance solution which unifies data across vertical silos to improve financial crime detection accuracy across the customer journey."
ForgeRock appoints APJ vice president David Hope
Hope joins ForgeRock with more than 20 years of experience in enterprise IT leadership roles.
Data is dispersed in the cloud beyond most enterprise control - McAfee
Thousands of data loss incidents occur every month in the cloud, leaving most at risk of sensitive data loss or regulatory non-compliance.
App infrastructure showing its age? It's time for a revamp.
App modernisation isn’t just about ROI — it’s about architecting for your future.
Investing in DevSecOps or cloud? Read this first
A definitive guide to navigating your cloud journey to ensure efficiency and best practices for your business.
Real malware attacks put Juniper Networks to the test
ESG decided to use malware attacks to evaluate market solutions like Juniper Networks’ automated threat detection and remediation.
Barracuda brings email protection to more Australian businesses
“This is a significant milestone for our Australian business to better serve all of our local customers, particularly those operating in regulated industries that face local data requirements."
Cyber attacks worsening among Australian businesses, costing economy $1 billion a year
"Cybercrime is becoming increasingly sophisticated and is harming more and more Australians each day."
Radiflow launches iRISK for greater visibility into risk and vulnerability
Radiflow, the company that provides cybersecurity solutions for industrial automation networks, has launched a business driven industrial risk analytics service known as iRISK.
Revealed: Best practices for embedded systems in a world of cyber attacks
By regularly updating an embedded system, manufacturers can keep their products secure.
How to have your security & innovation cakes - and eat them too
This research uncovers the tensions, concerns, and how to solve them.
Cyber crime ranks highest on business concerns for 2020, research finds
"The risk of cybercrime to businesses all around the world is continuing to multiply by the day."
DDLS recognised for DevOps work with new 'elite partner' accolade
DDLS has been named a DevOps Institute Elite Partner, the highest level of the DevOps Institute’s Tiered Global Education Partner Program.
Ixia enhances active network monitoring platform with machine learning
“Keysight’s Hawkeye utilises the power of machine learning to help network operations teams make sense of their increasingly complex networks."
Huge growth in malware connected to popular musicians - Kaspersky
Cybercriminals are actively abusing the names of artists and songs nominated for a Grammy 2020 award, in order to spread malware.
Australian IT firms discuss the highs and lows of hybrid cloud
Discussion participants cited ageing applications, the risk of moving inappropriate workloads to the cloud and the complexity of multi-cloud, hybrid cloud architectures as key issues to address.
Okta appoints NEXTGEN as first A/NZ distie
Okta is the latest global vendor to tap into the growing need for security and identity solutions in A/NZ.
Can you trust an MSSP? What's to trust?
Managed Security Service Providers for Dummies can tell you if it's better to go DIY or MSSP.
Real IT security challenges from cybersecurity experts
“You determine the level of response automation, and you can ratchet it up over time."
Business enthusiasm for emerging tech clashes with cybersecurity woes - CompTIA
The report also finds spending on hardware, software, services and telecom is projected to reach almost $5.2tn globally.
Micro Focus centralises policy controls for IT security admins
According to Micro Focus, the exponential growth of sensitive files represents the biggest challenge that information security professionals face.
Tencent Cloud acquires key cloud security standard
The security standard can give businesses insight into the level of cloud security they require.
nCipher introduces cloud-first architecture
New web services APIs and container technology streamline integration of nShield HSMs with cloud environments.
Five ways cyber deception can help boost IT security
With organisations constantly on the hunt for ways to improve the security of their IT infrastructures, they are affording growing attention to a technique dubbed ‘cyber deception'.
Tasmania Node launches with a focus on developing cyber security innovation
The Tasmania Node will have a particular focus on driving national strategy in the smart cities, Internet of Things (IoT) and marine technology sectors.
Data dispersal growing risk for enterprises, report finds
“As organisations around Australia quickly move toward cloud environments, data is no longer tied to enterprise networks. The dispersion of data fragments visibility and control, hereby, opening doors to security vulnerabilities."
Malwarebytes adds former Dropbox CMO to its board
Malwarebytes has snapped up former Dropbox CMO Carolyn Feinstein as its newest member of the Malwarebytes board of directors.
Nexon splashes out on three new acquisitions
The MSP has bought out Kiandra IT’s technology services and security solutions division, Remagine Solutions and XCentral.
Metadata retention laws “abused” by enforcement agencies
The PJCIS, Human Right Law Centre, Digital Rights Watch and Access Now are calling for the repeal or amendment of the controversial laws.
Third party guidelines triple chances of receiving compensation after attacks - survey
Damage from supply-chain attacks cost companies approximately US$2.57 million on average.
Thycotic reports 67% rise in revenue
The company's sales were also up by 35% year on year, with staff numbers also rising by 50%.
Official launch of AustCyber’s cybersecurity Innovation Node
The node is the latest addition to AustCyber’s national network of cybersecurity Innovation Nodes.
Xfinity left vulnerable to serious security threats - Swascan
Swascan found several gaps in Xfinity's data security which left them vulnerable to attacks.
Undetectable and inescapable: the secrets of APT cyber threats
Advanced persistent threats are attacks capable of breaching data infrastructure through continuous targeting.
The cloud skills gap is biting: How organisations can bite back
71% of IT decision makers say their firms have lost revenue due to a lack of cloud expertise.
15,000 companies still critically vulnerable from Citrix security flaws - report
Positive Technologies reports 1 in 5 companies affected have not taken any action to address the threat.
Fortinet: Attackers doubling down on CMS and web infrastructure attacks
Fortinet: Attackers doubling down on CMS and web infrastructure attacks Fortinet’s latest quarterly threat report highlights the summer antics in the threat landscape and which areas bad actors are targeting.