SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 663

Story image
Interview: Building secure apps from the ground up
Tue, 13th Nov 2018
#
mfa
#
iam
#
apm
Building secure apps from the ground up is crucial as digital transformation empowers firms to automate. Mobile Mentor’s Liz Knight discusses key strategies.
Story image
The quid pro quo in the IoT age
Tue, 13th Nov 2018
#
iot
#
iam
#
healthtech
As the digital economy booms, consumer data swaps for benefits drive IoT; however, security gaps prompt calls for robust protections.
Story image
How to effectively implement a software-defined secure network
Mon, 12th Nov 2018
#
firewalls
#
network infrastructure
#
network security
Juniper responds to failing corporate defences, offering a unified cybersecurity platform that evolves with threats.
Story image
Ransomware infection? Here’s how you control the damage
Mon, 12th Nov 2018
#
malware
#
ransomware
#
breach prevention
Ransomware has evolved to be more sophisticated and targeted, and remains a threat to businesses of all sizes.
Story image
Exclusive: Fileless malware driving uptake of behavioural analytics
Mon, 12th Nov 2018
#
malware
#
siem
#
ueba
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
Story image
'DerpTrolling’ faces jail time for Sony DoS attacks
Mon, 12th Nov 2018
#
gaming
#
ddos
#
digital entertainment
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
Story image
It's time to rethink your back-up and recovery strategy
Mon, 12th Nov 2018
#
dr
#
cloud services
#
opinion
Legacy approaches to backup and recovery may no longer be enough for organisations as data becomes increasingly distributed.
Story image
Impact of legacy technologies on threat alert response and cloud adoption among Aus enterprises
Mon, 12th Nov 2018
#
cloud services
#
juniper networks
#
ovum
Most Australian enterprises today are hamstrung by the same technologies that once helped advance the nation’s IT economy.
Story image
The five-step guide to securing data in the cloud - IDC
Mon, 12th Nov 2018
#
migration
#
cloud security
#
multi-cloud
Cloud's rise brings hybrid and multicloud challenges, IDC and Forcepoint guide on secure cloud data transition.
Story image
ForeScout acquires OT security company SecurityMatters for US$113mil
Mon, 12th Nov 2018
#
iot security
#
forescout technologies
#
m&a
ForeScout Technologies has acquired OT security company SecurityMatters for USD $113 million, enhancing its ability to secure both IT and OT environments.
Story image
Dropbox strengthens security with raft of new partnerships
Fri, 9th Nov 2018
#
hyperscale
#
public cloud
#
dlp
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Story image
Companies swamped by critical vulnerabilities – Tenable
Fri, 9th Nov 2018
#
tenable network security
#
report
#
cybersecurity strategy
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Story image
Don’t let your network outgrow your IT team
Thu, 8th Nov 2018
#
network infrastructure
#
sdn
#
naas
Growing complexity in business networks can overwhelm IT teams. Pruning back complexity and increasing visibility can help IT teams stay in control.
Story image
Case study: Startup revamps systems with HID mobile access
Thu, 8th Nov 2018
#
case study
#
mobility
#
mobile apps
French startup Deskopolitan has chosen to work with HID Global solutions to improve its co-working spaces and offer innovative experiences to clients.
Story image
Three access management trends making waves in APAC
Thu, 8th Nov 2018
#
mfa
#
iam
#
data privacy
Identity and Access Management (IAM) emerges as a key cybersecurity focus in APAC, driven by severe impacts of cyber attacks and stringent GDPR regulations.
Story image
The silent security risk of unstructured data
Thu, 8th Nov 2018
#
data protection
#
data analytics
#
martech
Australian businesses are struggling to manage and secure their distributed unstructured data, leading them to turn towards software-defined storage solutions.
Story image
Combatting the rise of Cybercrime-as-a-Service
Wed, 7th Nov 2018
#
malware
#
breach prevention
#
wireless networks
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
Story image
Secure Logic calls on Federal Govt to introduce IoT regulation
Wed, 7th Nov 2018
#
ddos
#
iot security
#
iot
Secure Logic CEO calls for Australian Government to introduce regulation mandating security practices for IoT devices.
Story image
Aus businesses see themselves as prime targets for cyber attacks
Wed, 7th Nov 2018
#
breach prevention
#
cybersecurity
#
aura information security
Around 30% of Australian businesses feel more vulnerable to cyber attacks than global counterparts, with many doubting their ability to prevent breaches.
Story image
ThreatQuotient partners with Visa for payments safety
Tue, 6th Nov 2018
#
martech
#
commerce systems
#
partner programmes
ThreatQuotient integrates verified breach intelligence from Visa to help customers detect and protect against cyber attacks on payment data.