SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 741

Story image
Introducing the dawn of a radical approach to cyber risk management
Thu, 4th May 2017
#
ai security
#
risk & compliance
#
ai
It’s time to think inside the box. Threat prevention offers the lowest risk, lowest cost and limited liability, according to experts.
Story image
Endpoint security can halt the ransomware scourge in its tracks
Thu, 4th May 2017
#
malware
#
ransomware
#
ai security
Ransomware is one of cybersecurity’s biggest problems - attack volumes are skyrocketing by 100% every year and attackers are getting rich.
Story image
Epic hacker fail: An exclusive look at the Netflix hack with ESET
Thu, 4th May 2017
#
malware
#
digital entertainment
#
cybersecurity
We chatted with ESET’s senior research fellow Nick Fitzgerald for an expert's views on what the Netflix hack means for the future of streaming.
Story image
Global warning as spam attacks target stock market manipulation
Thu, 4th May 2017
#
spam
#
stock market
#
retarus
Sophisticated spam blitz threatens markets as Retarus flags a botnet's discreet bid to skew a Latvian stock's value.
Story image
Optus Business launches Cyber Education program for Australian students
Thu, 4th May 2017
#
cybersecurity
#
optus
#
skills gap
Optus Business has launched a new Cyber Education program designed to encourage students to consider a career in cybersecurity.
Story image
How to take the stress out of protecting your digital assets
Thu, 4th May 2017
#
digital transformation
#
cisco
#
dna
Cisco Next-Generation Firewall is the industry’s first and only threat centric firewall. Cisco NGFW gives you deep visibility into your network.
Story image
May the 4th be with you: Star Wars tech that actually exists
Thu, 4th May 2017
#
cloud services
#
3d printing
#
star wars
From holograms to bionic limbs, this Star Wars day unveils real-life tech feats inspired by the saga's futuristic vision.
Story image
One Identity closes the circle with new partner program
Wed, 3rd May 2017
#
iam
#
one identity
#
partners
IAM vendor One Identity has launched a new multi-tier partner program which it says increases the available financial incentives by four times.
Story image
It's a game of risk: DDoS attacks intensify in 2017
Wed, 3rd May 2017
#
malware
#
ddos
#
cybersecurity
Distributed denial of service (DDoS) attacks are getting larger this year and it’s now a game of risk, according to a new report from Neustar.
Story image
Gemalto puts final touches on 3M Identity Management acquisition
Tue, 2nd May 2017
#
biometrics
#
3m
#
gemalto
Gemalto has put the final touches on its acquisition of 3M’s Identity Management Business - a deal worth $850 million.
Story image
Exclusive Networks wins big with Fortinet
Tue, 2nd May 2017
#
firewalls
#
network infrastructure
#
network security
Exclusive Networks bags 4 big wins at Fortinet's Accelerate 2017, lauded for robust APAC growth and technical prowess in cybersecurity.
Story image
Fight malware by spotting the top eight indicators of threat traffic in your network
Tue, 2nd May 2017
#
malware
#
siem
#
cybersecurity
There are eight main indicators that can help detect compromised networks. Here's how you can catch threat traffic before it cripples your systems.
Story image
LogRhythm’s Network Monitor Freemium an impressive winner when put to the test
Tue, 2nd May 2017
#
storage
#
siem
#
reviews
Not all security tools have to come with a price tag. The SANS Institute takes at a look at LogRhythm's NetMon Freemium Version 3.2.3.
Story image
Is your healthcare data safe? Here are three ways to protect it
Tue, 2nd May 2017
#
network infrastructure
#
sdn
#
naas
Healthcare providers and healthcare systems have some of the most valuable information not only for patient health, but also for cyber attackers.
Story image
Are you ready? Only five weeks until China's new data security law comes into effect
Tue, 2nd May 2017
#
data protection
#
law
#
dla piper
With China’s new cybersecurity law only five weeks away, businesses should be preparing and understanding the new rules.
Story image
Fake Chrome extensions inject code into web pages
Tue, 2nd May 2017
#
malware
#
digital entertainment
#
cybersecurity
Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected.
Story image
How to support a remote workforce without losing your mind
Tue, 2nd May 2017
#
hybrid & remote work
#
microsoft
#
lenovo
Embracing remote work with sanity intact: Lenovo's guide to managing virtual teams effectively beckons a strategic tech approach.
Story image
Atlassian's workplace chat tool 'HipChat' affected by data breach
Tue, 2nd May 2017
#
breach prevention
#
cybersecurity
#
data breach
Workplace group chat tool HipChat has been hit by a data breach and users are being advised to check if they are vulnerable.
Story image
Endace hires new VP Product Management to drive growth of partner program
Tue, 2nd May 2017
#
partner programmes
#
endace
#
channel infrastructure
Cary Wright will be joining the provider of high speed network recording and network history playback with the aim to drive channel growth.
Story image
Multi-product deployments and large deals driving Fortinet growth
Mon, 1st May 2017
#
firewalls
#
network infrastructure
#
network security
Large deals and multiple product deployments have seen Fortinet log continued strong growth, with revenue up 20% in Q1.