SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 750

Story image
Acronis: Australian companies are 'unaware of the importance of data backup'
Tue, 21st Feb 2017
#
dr
#
cloud services
#
acronis
Crazy Domains taps Acronis to bolster Aussie firms' backup savvy, tackling pervasive data protection unawareness.
Story image
CyberArk expands partner program in privileged account security push
Tue, 21st Feb 2017
#
healthtech
#
cyberark
#
partners
CyberArk has ramped up its partner program in an effort to enhance its partners' privileged account security expertise and drive new business.
Story image
Check Point joins Cyber Threat Alliance alongside global security heavyweights
Tue, 21st Feb 2017
#
advanced persistent threat protection
#
cyber threats
#
cyber threat alliance
Check Point is the sixth member in the global Cyber Threat Alliance (CTA), alongside Cisco, Fortinet, Intel Security, Palo Alto Networks and Symantec.
Story image
Welivesecurity reveals the eight things you should know about spyware
Tue, 21st Feb 2017
#
malware
#
cybersecurity
#
spyware
Spyware is widely spread across the web, and is ever present on today’s mobile and desktop devices. You should be security-conscious at all times.
Story image
Govt showcases Australia’s cybersecurity strengths to the world
Tue, 21st Feb 2017
#
cybersecurity
#
software development
#
australian government
It’s all hands on deck for the Australian cybersecurity sector, according to the Trade and Investment Commission.
Story image
CompTIA zeroes in on behavioural analytics with new global security certification
Tue, 21st Feb 2017
#
data analytics
#
martech
#
planning
CompTIA introduces CSA+ certification, pioneering behavioural analytics in global IT security to tackle advanced cyber threats.
Story image
Centrify harnesses machine learning for user access protection
Mon, 20th Feb 2017
#
pam
#
centrify
#
analyst report
Centrify has today launched its new analytics service to the ANZ region, which provides another solution to stop breaches in real time.
Story image
ESET receives three AAA ratings in anti-malware protection tests
Mon, 20th Feb 2017
#
malware
#
cybersecurity
#
se labs
ESET has walked away with three of what it calls the ‘highest accolades’ in the SE Labs Anti-Malware Protection Tests.
Story image
Phishers bypass content blockers and target Apple users in latest attacks
Mon, 20th Feb 2017
#
phishing
#
email security
#
personal computing devices
A simple replica login page is fooling Apple users into falling for a phishing attack - and it's using font substitution to bypass content blockers.
Story image
In depth: Mimecast talks email security, insider threats and human firewalls
Mon, 20th Feb 2017
#
malware
#
cybersecurity
#
email
Email security breaches continue to occur due to evolving threats and a lack of next generation security solutions, according to Mimecast's Dave Hood.
Story image
Traditional security is dead: It's time to think of the next generation
Mon, 20th Feb 2017
#
endpoint protection
#
ai security
#
edr
Security spend is rising, but so are the number of data breaches. Something isn’t working. It's time to think next-generation endpoint security.
Story image
Opportunistic cyber attacks most dangerous, says SecureWorks report
Fri, 17th Feb 2017
#
malware
#
ransomware
#
advanced persistent threat protection
SecureWorks' new report reveals a way for organizations to fight opportunistic cyber attacks and highlights pitfalls in the security industry.
Story image
Bitdefender discovers new Mac malware on the scene
Fri, 17th Feb 2017
#
malware
#
cybersecurity
#
personal computing devices
Another notorious Mac malware has popped up on the scene. Xagent can rob users of passwords, iPhone backup data and take screenshots.
Story image
Exploring the cybercrime underground: Darknet markets - where cyber criminals trade
Fri, 17th Feb 2017
#
firewalls
#
network infrastructure
#
network security
This blog focuses on explaining what darknet markets are, common payment model used, the type of digital data being bought and sold, and their costs.
Story image
Virtual environments blurring the edges for network managers
Thu, 16th Feb 2017
#
virtualisation
#
ixia
#
resilience
Virtual environments are causing problems for network managers, straining and distorting network edges, according to Ixia.
Story image
Gemalto bumps up encryption offerings for enterprise customers
Wed, 15th Feb 2017
#
data protection
#
encryption
#
multi-cloud
Gemalto bumps up enterprise encryption offerings demand increases for speed, performance and security across cloud, applications and networks.
Story image
Mirai botnet now targeting Windows PCs to access IoT devices
Wed, 15th Feb 2017
#
ddos
#
iot security
#
symantec
Notorious IoT malware ‘Mirai’ has now jumped ship to infect Windows devices and Symantec is warning users to make sure they don't get caught.
Story image
Cylance outshines competition in AV testing stakes
Wed, 15th Feb 2017
#
malware
#
endpoint protection
#
ai security
AI security provider Cylance has beaten five of the top legacy AV vendors in a test designed to analyse unknown and known malware detection.
Story image
IBM Watson has a new job: Cognitive cybersecurity expert
Wed, 15th Feb 2017
#
uc
#
martech
#
cybersecurity
Watson has spent the past year training in cybersecurity language from more than one million security documents, and is now being integrated into SOC.
Story image
Watch out for 'The Wolf': Mr Robot star turns device hacker in new HP web series
Wed, 15th Feb 2017
#
endpoint protection
#
edr
#
hp
HP is kicking off a global cybersecurity awareness campaign and who better to take centre stage than the star of the hit hacker TV series, Mr Robot.