Tesla's suit against ex-employee a strong case for IP security
“There was no need for this employee to be using their own iCloud for data storage even if the original intent was non-malicious."
Overcoming deepfakes with deep learning
Why 5G and AI will determine cybersecurity strategy for the next decade
Whitepaper: Using syslog-ng to beat artificial ignorance
Cyber threats: Legacy systems aren't always the culprit
Enterprise at tipping point, says Symantec
Who is really responsible for cloud security?
Genetec announces new line of hybrid access control and intrusion hardware
Synergis IX provides a gateway to unified security, enabling customers to manage their security systems on a single interface.
Experts discuss VMware Cloud on AWS use cases
Key issues were included ageing applications, the risk of moving inappropriate workloads to the cloud and the complexity of multi-cloud, hybrid cloud architectures.
Whitepaper: Measuring SIEM’s ability to create actionable defence
Many organisations are struggling to keep pace with the speed in which hackers are attacking their system.
One-size-fits-all not enough to secure IoT
"The growing trend for greater connectivity puts everyday objects at risk of exploitation."
Whitepaper: Using logs to drive compliance
Log messages are filled with personal information that require proper security in order to comply with the Privacy Amendment Act 2017.
Do we need cybersecurity training? Phishing remains problem area
“Implementing ongoing and effective security awareness training is a necessary foundational pillar when building a strong culture of security."
Marriott, British Airways fines highlight critical need for security investment
The last week has brought heavy fines against the likes of global hotel chain Marriott and airline British Airways, casting a harsh spotlight on the price of cyber attacks.
Application modernisation for the digital enterprise
The digital enterprise couldn’t exist without modern applications – otherwise it would be nothing more than a stale system that’s slow to react to the rapidly-changing conditions in today’s business environment.
Protecting remote staff from phishing attacks – WatchGuard
Close to 50% of Australian employees worked remotely for at least half the time, according to a 2018 survey by IWG.
RSA responds to increasing A/NZ regulations with new updates
The new data protection and privacy management capabilities will help business in the A/NZ region to better ensure data protection and privacy regulations and compliance, according to the company.
Global banks fail to keep up with application security
One bank had an unpatched vulnerability that has existed since at least 2011.
Eaton brings first lithium-ion UPS to A/NZ
Designed for distributed IT and edge computing, the UPS offers increased network security and battery life, and remote management capabilities.
HCL Technologies closes acquisition of IBM products
Company launches HCL Software business unit to operate the enterprise software offerings.
Kroll expands into Australia with Enex Carbon acquisition
The Enex Carbon team will join Kroll’s Cyber Risk practice and will be led by managing director and Asia Pacific leader Paul Jackson.
Frost & Sullivan: How SIEM is either an enabler or a retardant
Addressing a constant flow of security alerts is an inevitable consequence of the digital age.
Docker users, here’s how you can integrate syslog-ng in your workflow
Containerization, and Docker in particular, changed the way organisations distribute and run applications.
Case study: How Central Innovation prototyped the Nura headphones with SOLIDWORKS
Sound pioneer Nura had an ambitious concept to deliver when it raised almost two million dollars via crowdsourcing and then over five million dollars through a seed round.
Financial organisations plagued by spear phishing attacks
Finance department employees are most heavily targeted by these attacks, because they are most likely to deal with banks and other financial institutions.
Log classification doesn’t have to be mundane and repetitive – here’s how
It’s not hard to say ‘I don’t envy you’ to system administrators who are lumped with the burden of classifying log messages every time somebody conducts an action on the network.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.
How to navigate the innovation versus security dilemma
Australian organisations place the highest importance on improving employee productivity and enhancing business resilience.
Whitepaper: Why accurate log processing is key to effective SIEM
SIEMs form the core of many enterprises’ IT security strategies, but they can be expensive to deploy and maintain.
Responsible AI starts with responsible leaders - PwC
Responsible practices in artificial intelligence (AI) starts with how each individual organisation plans to strategise, design, develop, and deploy the technology.
One Identity solution achieves new SAP certification
Customers can benefit from improved interoperability with SAP applications and with the large ecosystem of solutions that run on SAP NetWeaver.
Leveraging Elasticsearch and syslog-ng to maximise log management
Syslog-ng is a single, high-performance log collector for device, system, and application logs, greatly simplifying logging architecture.