SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 784

Story image
Aussie PC users patching software vulnerabilities, but big challenges still remain
Wed, 4th May 2016
#
breach prevention
#
cybersecurity
#
personal computing devices
A recent study by Flexera Software had mixed results for Australia’s PC users - is the software on your PC safe?.
Story image
Third party risks ‘a serious risk’
Wed, 4th May 2016
#
malware
#
risk & compliance
#
cybersecurity
'Not having single individual or department in charge of managing third party risk leaves organisations more vulnerable to threats.'.
Story image
Australia first to get DiData Blue Coat cloud security service
Wed, 4th May 2016
#
dimension data
#
blue coat
#
extend
Dimension Data and Blue Coat's managed cloud security service, designed to extend web security controls to the cloud, is rolling out first in Aussie.
Story image
Webroot, Citrix team up to target malicious IP addresses
Wed, 4th May 2016
#
virtualisation
#
daas
#
ai security
Webroot and Citrix integrate to enhance security and scalability for enterprise customers. #cybersecurity #cloudsecurity.
Story image
Is Big Brother watching? How metadata can affect you
Wed, 4th May 2016
#
cybersecurity
#
australian government
#
akolade
It's been 5 months since the introduction of Australia's metadata laws came into effect, and the general public's understanding remains vague at best.
Story image
Workload scheduling software: the latest enterprise craze
Tue, 3rd May 2016
#
healthtech
#
personal computing devices
#
productivity
Workload scheduling software is having its time to shine, as businesses look to increase efficiency and productivity.
Story image
The perimeter is everywhere - so where is your data really?
Mon, 2nd May 2016
#
malware
#
data protection
#
cybersecurity
In an era of ubiquitous data migration, safeguarding your data's whereabouts is crucial yet increasingly complex, says ESET researcher Cameron Camp.
Story image
Palo Alto is winning the malware analysis game
Mon, 2nd May 2016
#
malware
#
advanced persistent threat protection
#
cybersecurity
Palo Alto Networks' WildFire tops Forrester's automated malware analysis, defining the future of cyber defence strategies.
Story image
Multi-factor authentication to be the norm by 2020
Mon, 2nd May 2016
#
mfa
#
cybersecurity
#
healthtech
Multi-factor authentication has become commonplace as a number of industries, particularly the govt sector, is looking to strengthen security measures.
Story image
CyberArk launches cyber security membership
Fri, 29th Apr 2016
#
devops
#
pam
#
partner programmes
CyberArk's C3 Alliance unites tech giants to fortify privileged account security, countering one of enterprise's top cyber threats.
Story image
Fortinet unveils 'security fabric' for distributed security in an IoT world
Fri, 29th Apr 2016
#
firewalls
#
network infrastructure
#
network security
Fortinet has unveiled its security fabric, which it says will arm global enterprises with pervasive, adaptive cybersecurity from IoT to cloud networks.
Story image
The Internet of Things and security: Is your enterprise protected?
Fri, 29th Apr 2016
#
iot security
#
iot
#
risk & compliance
In this time of digital transformation, it's vital for businesses to understand the risks and opportunities unleashed by the ecosystem of ecosystems.
Story image
Symantec CEO exits as company reduces revenue forecast
Fri, 29th Apr 2016
#
cybersecurity
#
symantec
#
veritas
Symantec chief executive Michael A Brown is exiting the company, with the vendor also revising its Q4 revenue forecast downwards by US$12 million.
Story image
ANZ leading the pack as Fortinet logs bumper Q1 revenue
Fri, 29th Apr 2016
#
firewalls
#
network infrastructure
#
network security
Fortinet has posted a 34% increase in global revenue for the first quarter of 2016, with local results tracking even higher.
Story image
Does automation trump professionals when it comes to hacking?
Thu, 28th Apr 2016
#
ddos
#
cybersecurity
#
ixia
Automated software should be considered for security testing internal systems, according to Ixia. Hiring hackers can be expensive.
Story image
Flexera identifies top PC vulnerabilities for Aussie users
Thu, 28th Apr 2016
#
cybersecurity
#
personal computing devices
#
microsoft
Australian PC users are slowly patching software vulnerabilities, but some challenges remain, according to Flexera Software's latest report.
Story image
Cyber threats evolving at a rapid pace
Wed, 27th Apr 2016
#
casb
#
forcepoint
#
cyber attacks
Cyber threats are rapidly evolving, warns Forcepoint's Global Threat Report, with severe consequences for businesses.
Story image
Check Point brings advanced threat protection to SMBs and enterprises
Wed, 27th Apr 2016
#
encryption
#
advanced persistent threat protection
#
smb
Check Point has launched a range of advanced threat prevention platforms to combat the growing frequency of cyber attacks.
Story image
Fighting bank fraud and improving the customer experience: Can they work together?
Wed, 27th Apr 2016
#
public cloud
#
fintech
#
cx
Decreasing the risk of bank fraud and improving the customer experience are both based on knowing the customer - can they work together?.
Story image
The lowdown on Aussie Govt's Cyber Security Strategy
Tue, 26th Apr 2016
#
cybersecurity
#
australian government
#
founders
Malcom Turnbull recently announced Australia’s Cyber Security Strategy for the future - here are some insights from professionals in the industry.