Nuance revamps AI authentication to protect seniors from fraud
The tool utilises intelligence voice detection capabilities to let enterprises identify if callers are over the age of 65 and, if so, prioritise their call, get them to a live agent for service and better protect them from fraud.
Report: Tech industry most attacked sector
A winning proposition for critical infrastructure
Thycotic acquires Onion ID, launches new access management products
Why shifting workforce demographics requires updated management
New tech startup looks to help lawyers and finance pros
Revealed: How to make authentication simple again
The juggling act: Managing dynamic workforces and the risk that goes with them
Mitigate and continuously manage dynamic workforce risks, and continuously improve and maintain the maturity of your dynamic workforce risk program.
WatchGuard completes acquisition of Panda Security
Executives say the immediate goal of the now-combined companies is to provide stakeholders access to a newly expanded portfolio of security solutions.
Current security practices 'grossly inadequate' for protecting cloud infrastructures - report
"As cloud stacks become increasingly complex, with new technologies regularly added to the mix, what's needed is a holistic approach with consistent protection across the full cloud stack."
Demand for VPNs soars in Hong Kong amid fears over Beijing crackdown
VPN provider Surfshark revealed it has seen a week’s worth of sales in just one hour within the city, indicating that locals feel their internet freedom is under attack.
ExtraHop brings SaaS network detection and response solution to market
"Reveal(x) 360 is the culmination of a multi-year R&D investment to secure data centre, remote sites, and cloud workloads with frictionless deployment and actionable insights that can be securely accessed from anywhere.”
Endace and Palo Alto Networks launch integration to empower security teams
“The combination of Cortex XSOAR’s powerful orchestration and automation capabilities with the rich network history recorded by the EndaceProbe Analytics Platform gives security operations access to the conclusive forensic evidence they need to respond quickly and accurately to threats.”
Cisco buys ThousandEyes, strengthening network portfolio
Cisco is eyeing up network intelligence company ThousandEyes for its latest acquisition, building on Cisco’s cloud-based network and application performance portfolio.
Cloud, VPNs & digital workspaces: 3 focus areas for enterprise security
Authentication can bring three things to the table: Choice, appropriate risk analysis, and ease of use for everyone.
Survey: poor backup planning can cripple online retail
New survey finds one in four retailers have permanently lost critical business data, damaging sales and revenue.
Webcast Series: Best security practices for a mobile workforce
Join an exclusive monthly webcast series to learn how to better secure your mobile workforce in the evolving threat landscape.
How to work from home securely
Here’s what you need to do to make your home working environment and systems secure, and protect yourself and your employer.
Acronis teams up with A.S. Roma to advance AI in sport
Acronis has officially announced its artificial intelligence (AI) partnership with Associazione Sportiva Roma, an Italian professional football club also known as A.S Roma.
IDC names Accenture APAC Leader in pro security services
Accenture was recognised as having one of the most comprehensive security advisory and security assessment offerings.
Why cybersecurity solutions are more important than ever
Phishing, malware, ransomware - the COVID-19 crisis has increased all of their risk factors significantly. Protect yourself from the perfect storm.
Cybercriminals seeking greater anonymity online, Trend Micro states
Cybercriminals have switched to ecommerce platforms and communication using Discord for greater anonymity, according to new research from Trend Micro.
Rise in cyberattacks targeting the cloud as use of collaboration tools increase
“While we are seeing a tremendous amount of courage and global goodwill to overcome the COVID-19 pandemic, we also are unfortunately seeing an increase in bad actors looking to exploit the sudden uptick in cloud adoption."
40% of APAC consumers have dealt with personal data breaches
The Kaspersky report released today also found out that more than 20% of respondents in APAC are willing to sacrifice their privacy to gain a product or a service for free.
Channel guru brings Bufferzone to A/NZ
Previously, Wyman brought Backup Exec/Veritas, Brocade and StorageCraft to the region.
HCL takes over Broadcom’s Symantec security consulting
As part of the partnership, the majority of Broadcom's Symantec enterprise consulting team will transition to HCL.
Swann releases two new smart security cameras
The solutions include tracking, night vision, and other features, supported by a connected application.
Dialing in from home: Why VPNs are essential for your corporate network
Right now, how many employees, partners, or contractors are working from home and logging into your network?
Zscaler buys Edgewise, with its sight set on zero-trust
The acquisition indicates Zscaler's path towards improving the security of east-west communication, as well as its quest to achieve a zero-trust environment.
CrowdStrike and ExtraHop partner up to bolster cloud threat detection
The companies say the partnership will marry network visibility, machine learning (ML) behavioural threat detection and decryption of SSL/TLS sessions.
Months on, many organisations still don't have secure remote access - report
The report analyses the extent to which businesses were prepared for the sudden shift into remote working due to COVID-19 restrictions, and analyses how organisations have adjusted to support remote workers amidst the COVID-19 pandemic.
Google most popular brand to impersonate in phishing campaigns - report
A new report from Barracuda released today shows 100,000 attacks impersonating reputable brands, with 65% of this figure using Google as a masquerade.
All we need to know about reverse proxy
To misquote George Orwell, not all cloud access security brokers (CASBs) are created equal.
LogRhythm launches Remote Workforce Visibility with promotion
"We want to help teams get ahead of this situation and ensure they have the resources they need to be confident in their security abilities."
Dark web packed with offers to hack corporate networks
"The larger the hacked company is, and the higher the obtained privileges, the more profitable the attack becomes."
Thycotic launches DevOps Secrets Vault solution for greater cloud security
“DevOps Secrets Vault is a cloud-based vault that balances the security and velocity that DevOps teams require for this growing part of the enterprise attack surface."
DigiCert receives top award from Frost & Sullivan thanks to agile approach
DigiCert has received the 2020 Global Company of the Year Award by Frost & Sullivan, with specific focus on its global transport layer security (TLS) certificate market.
Five wine-tasting tips that should be applied to network security
What does network visibility really mean? Much like a blind wine tasting, we need to keep an open mind and trust what data is telling us without being biased by previous results.
How to deploy containerised apps in your cloud infrastructure
Move your business into the future - take advantage of a free consultation to pinpoint how container-based applications can propel your cloud infrastructure to new heights.
Exabeam targets APJ with ‘significant investment’
Triples its team across the region and forms an exclusive partnership with Orca Tech in A/NZ as SIEM demand rises.
Cost-effective security key demand for MSPs
A new survey conducted by Omida and commissioned by Acronis shows that there is an “overwhelming” demand for security services among MSPs.
Phishing campaigns aren't stopping - but neither are their opponents
Months on, and phishing campaigns taking advantage of the pandemic show no signs of slowing down. The time for anti-phishing solutions is now.
Chinks in the armour: Why the post COVID-19 cloud is easy game for cybercriminals
Now’s the time for CIOs to pause and make sure their digital transformation projects are fit for today, and the future.
Buying less, doing more: How the security operations centre model can help to control cybersecurity
‘Security solutions good, more security solutions better’ is the mentality behind high tech protection procurement, but it's not the best choice.
Cybercriminals exploiting virus fears to gain access to corporate IT systems
COVID-19 may have changed the way many people work, but this doesn’t have to mean companies must accept lower levels of security.
Cybercriminals after money more than anything else - Verizon report
Of all the things cybercriminals aim to accomplish in their illicit activities, money still takes centre stage.
Cyber alert: tackling the unseen risk that could sink your business in 2020
A successful cyber attack can have many implications for your business, including a price tag you may be unwilling or unable to pay.
Interview: Thriving in lockdown - how a coding school in Vietnam beat the odds
It's March 10 2020, and CoderSchool in Ho Chi Minh just went entirely online. A success story followed - here's how a lockdown helped a school thrive.
11 new orgs join fight against insidious Stalkerware
Founded last year, the Coalition Against Stalkerware brings together cybersecurity vendors, domestic violence organisations, and digital rights advocates.