SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 705

Story image
Looking at what lies ahead in a Post-NDB world
Fri, 16th Mar 2018
#
firewalls
#
network infrastructure
#
network security
Fortinet takes a look at what business priorities should be in the wake of the Notifiable Data Breach Laws coming into effect.
Story image
Bitcoin’s not a fad, it’s a waiting game
Fri, 16th Mar 2018
#
blockchain
#
defi
#
bitcoin
The Bitcoin's wild price swings have polarised people into evangelists and detractors - but why does the technology matter?.
Story image
Intel aims to battle cyber security risks at a silicon level
Fri, 16th Mar 2018
#
cybersecurity
#
intel
#
spectre
In addressing the vulnerabilities reported by Google Project Zero, Intel and the technology industry have faced significant challenges.
Story image
Palo Alto Networks forks out $300m cash to acquire Evident.io
Fri, 16th Mar 2018
#
firewalls
#
network infrastructure
#
network security
In a move to extend its cloud security offerings, Palo Alto Networks has entered into a definitive agreement with Evident.io.
Story image
Analyst taps Webroot as “trail blazer” in APT protection
Thu, 15th Mar 2018
#
endpoint protection
#
ai security
#
edr
Webroot says it was recognised by Radicati Group for its real-time, cloud-based approach to preventing malware.
Story image
Google to follow Facebook's lead on banning cryptocurrency ads
Thu, 15th Mar 2018
#
blockchain
#
email security
#
cybersecurity
Google will ban cryptocurrency ads from June 2018, tightening its Financial services policy, following Facebook's similar move to combat scams.
Story image
Why organisations should consider new innovations to secure print device access
Thu, 15th Mar 2018
#
document management
#
ecm
#
martech
As the Internet of Things expands in offices, securing multifunction devices becomes crucial. Y Soft suggests new innovations are essential to counter threats.
Story image
70% of firms would fail a privileged account management audit
Thu, 15th Mar 2018
#
pam
#
cybersecurity
#
thycotic
Firms believe privileged account management is important for security - but why are they still doing it wrong?.
Story image
New study details how easy it is for hackers to steal your data
Thu, 15th Mar 2018
#
malware
#
cybersecurity
#
hackers
It’s no secret that web browsers store a substantial amount of sensitive information about their users - hackers are taking advantage of this.
Story image
Federal Govt & Defence sectors launch secure IT lifecycle services facility in Canberra
Wed, 14th Mar 2018
#
data protection
#
lifecycle asset management
#
greenbox systems
Emphasis on the secure management of sensitive IT assets from imaging to disposal of extremely-sensitive data has generated significant interest.
Story image
Tighter data regimes demand action: four steps to cyber security
Wed, 14th Mar 2018
#
data protection
#
risk & compliance
#
data privacy
As China and the European Union (EU) strengthen their data protection regimes, organisations need to reassess their cyber security readiness.
Story image
Beyond the breach: How to preserve your customers’ trust
Wed, 14th Mar 2018
#
data protection
#
breach prevention
#
cybersecurity
Transactions happen online between two entities that will never see each other. This means trust matters even more as physical interactions disappear.
Story image
Could this new distributed ledger replace the blockchain?
Wed, 14th Mar 2018
#
blockchain
#
cybersecurity
#
distributed ledger technology
The Hedera hashgraph is supposedly faster and more capable of ensuring ongoing decentralisation than the existing blockchain platform.
Story image
Asia Pacific countries are a melting pot of cyber threats
Wed, 14th Mar 2018
#
malware
#
cybersecurity
#
trend micro
APAC was also the region affected by the highest number of threats in most recorded categories including online banking malware.
Story image
RSA Security director dissects identity & access management industry
Tue, 13th Mar 2018
#
iam
#
cybersecurity
#
cybercrime
As well as emerging technologies, Steve spoke about the future, the implications of GDPR, & strategies that businesses can use to overcome challenges.
Story image
Cybersecurity – be prepared for alert fatigue and understand the context
Tue, 13th Mar 2018
#
risk & compliance
#
skills gap
#
rsa security
With cyber threats on the rise, organisations are grappling with alert fatigue. Combatting breaches like Equifax and Uber’s requires context and smarter tools.
Story image
CyberArk strengthens defenses against privileged account exploitation through Vaultive buyout
Tue, 13th Mar 2018
#
devops
#
pam
#
iaas
CyberArk has bought out cloud security firm Vaultive as part of a move to extend its capabilities in the privileged account management space.
Story image
US healthcare workers willing to sell confidential data for as little as $500
Tue, 13th Mar 2018
#
data protection
#
healthtech
#
accenture
The survey found that 18% of the 912 respondents would be willing to sell confidential data for between $500-$1000 - and they have the means to do so.
Story image
Security experts demonstrate that ransomware attacks on robots are possible
Tue, 13th Mar 2018
#
malware
#
robots
#
ransomware
Researchers at IOActive have conducted what could be the world's first ransomware attack on robots, potentially disrupting the booming robotics market.
Story image
NSW Auditor-General uncovers State's inconsistent approach to cybersecurity
Tue, 13th Mar 2018
#
breach prevention
#
cybersecurity
#
security breaches
New South Wales' public sector lacks the capability to effectively detect and respond to cybersecurity incidents, warns the state's Auditor-General.