From predator to high-risk vaccine: Sophos tracks WannaCry's evolution
An analysis of around 2,000 WannaCry samples from 2018 shows they were adapted to bypass the famous kill switch, but unable to encrypt data.
How the iPhone malware discovery affects Apple users – Malwarebytes
Bridging the gap between on-premise and cloud with VMware Cloud on AWS
Over 50% of incident response requests occur after damage complete – Kaspersky
DTCC and Accenture unveil research on blockchain governance model
Trustwave platform brings more visibility and control cloud security
IXUP embeds Five Safes framework in platform
Five winning strategies for VMware in 2019
We look under the hood at the enterprise software vendors plans for the year.
Does your security team need a boost from an MSSP partnership?
Rackspace’s e-book has a practical set of protection measures, providing a framework for security decisions relevant to data centre and cloud infrastructure.
IoT a hot topic in cybercriminal underbelly
"We've lifted the lid on the IoT threat landscape to find that cybercriminals are well on their way to creating a thriving marketplace for certain IoT-based attacks."
AlgoSec announces new features to improve Cisco ACI automation and application visibility
AlgoSec A30 release delivers new automation capabilities that enable zero-touch security management across SDN, cloud and on-premise networks.
Proofpoint and CrowdStrike partner on endpoint protection integration
In the first technology integration, Proofpoint will check potentially malicious attachments with CrowdStrike Falcon Intel and will add new hashes to the customer’s custom intelligence.
VMware's open pledge to help partners and customers make their mark
Technology is neither good nor bad, but it’s often how we shape it. Will technology shape the world we want to live in? Or will it create a world we’re afraid to live in?
Whitepaper: The IT directors’ guide to application modernisation
The digital enterprise couldn’t exist without modern applications – otherwise it would be nothing more than a stale system that’s slow to react.
DNS amplification attacks increase 1000% since last year - Nexusguard
Enterprise networks and communications service providers (CSPs) need attack mitigation as DNS patch adoption creates new threats.
Number of attacked medical devices declines globally, but not in APAC - Kaspersky
Medical devices include all servers, computers, mobiles and tablets, IoT gadgets, and hospital machines that are connected to the internet inside a healthcare facility.
Businesses ignoring security when investing in new tech
Only a quarter of organisations are prioritising security when it comes to technology investment, according to a new report by Advanced.
Scale Computing integrates Acronis services into HC3 platform
The Scale Computing HC3 platform will now include Acronis Backup, which will deliver data protection, disaster recovery, and threat mitigation.
Sophos named Magic Quadrant Leader, changes up APAC channel staff
This is the 11th time in a row Sophos has been positioned as Leader and shaken up its APAC and A/NZ channel execs.
GitHub amps up vulnerability reporting capabilities
GitHub has announced new capabilities that make it easier for developers to report vulnerabilities directly from their repositories.
Gartner names Trend Micro leader in endpoint protection platforms
The endpoint is increasingly the frontline in the war against cyber-threats and IT teams are overwhelmed by the volume of alerts they must manage.
Security flaw left Android phones open to SMS phishing attacks found
Check Point Research discovered the vulnerability impacts phones from Samsung, Huawei, LG, and Sony.
Whitepaper: How businesses are navigating the competing needs for innovation and security
Given the importance organisations place on digitisation to transform operations, resolving the tension between innovation and security is critical to their long-term success.
HID Global acquires PKI-as-a-service solutions provider HydrantID
The acquisition of HydrantID will allow HID Global to offer enterprise customers a broader range of options, plus the flexibility and scalability of PKI-as-a-service.
Blockchain revenues to near US$10B despite 2018 crypto winter
This year blockchain is starting to find its feet as innovators find the use-cases that suit the specific areas in which it can provide value.
IBM launches data privacy platform for hybrid multicloud environments
The IBM z15 will enable customers to manage who can access data via policy-based controls such as encryption, cloud-native deployment, instant recovery, and data-centric privacy controls.
Why businesses need a strategy to combat the enemy within – Ping Identity
While strengthening your organisation’s external defences with the latest tools and technologies makes sound sense, it’s only half a battle plan.
Impulsive Aussie workers creating a security risk, research finds
A new survey has found Australians are creating an unnecessary security risk for their employers by deliberately avoiding overworked IT teams.
Beyond deployment: Making AWS work for your use case
If you’re a business that wants to understand how to save time with your technology, AWS actively seeks those optimisations and gets your technology to work in ways it couldn’t work before.
Mimecast’s top A/NZ channel partners of 2019
The company has announced the winners of its Mimecast Partner Awards which celebrate channel partner performance across eight categories.
How to manage Windows 10 like a smartphone
If only a business’ Windows 10 endpoints could be managed with the same simple, intuitive toolsets as smartphones.
Security concerns holding businesses back from digital transformation
The research, which comprised a series of qualitative interviews and a quantitative survey, identified three key barriers.