Latest news - Page 790

Unmanaged wearables pose threat to the enterprise
Tue, 8th Mar 2016
#
wearables
#
physical security
#
personal computing devices
Wearable device owners in the enterprise are neglecting login credentials, posing a growing IT security concern, warns Centrify RSA Survey.

Intel Security enters MSP agreement with CYBER-i
Mon, 7th Mar 2016
#
cybersecurity
#
intel security
#
agc networks
Intel Security has partnered with CYBER-i to offer outcome-based managed security services, due to increasing cyber threats.

There's no such thing as Mac OS X ransomware, right?
Mon, 7th Mar 2016
#
malware
#
ransomware
#
cybersecurity
OS X users have been hit with the first known case of Mac ‘ransomware’ malware, found in the recently released BitTorrent client app Transmission.

The time for micro-segmentation is now
Mon, 7th Mar 2016
#
micro-segmentation
#
cyber attacks
#
jpmorgan chase
In the wake of costly breaches, it's whole-system micro-segmentation that is set to redefine cybersecurity this year.

Govt's data breach bill will unleash confusion, says expert
Mon, 7th Mar 2016
#
breach prevention
#
cybersecurity
#
personal computing devices
Australian organisations will struggle to comply with the Federal Government’s mandatory data breach notification proposals.

Is managed security the answer to cyber crime?
Fri, 4th Mar 2016
#
centurylink
#
mssp
#
threat landscape
Businesses need to stay on top of emerging cyber threats, as hackers are becoming more resourceful, says CenturyLink.

EXCLUSIVE: Behind the scenes with Webroot MD
Fri, 4th Mar 2016
#
ai security
#
ai
#
webroot
Empathy and a natural curiosity - two valuable attributes for the IT industry according to Webroot's managing director of Asia Pacific.

Security vendor expands presence in APAC
Thu, 3rd Mar 2016
#
partner programmes
#
ueba
#
cybersecurity
Exabeam, the cyber security company specialising in user behaviour analytics (UBA), is expanding its channel programme and presence in Asia Pacific.

The surprisingly scary patterns revealed in hack attacks
Thu, 3rd Mar 2016
#
cybersecurity
#
software development
#
hackers
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.

More accolades for industry stalwart
Thu, 3rd Mar 2016
#
firewalls
#
network infrastructure
#
network security
Fortinet continues to scoop up industry accolades, adding two more to its growing list of winning third party evaluations.

Threat of DDoS and web application attacks more real than ever
Wed, 2nd Mar 2016
#
firewalls
#
ddos
#
network infrastructure
DDoS and web application attacks are increasing, with repeat attacks becoming the norm, according to Akamai Technologies.

Healthcare organisations buckle under pressure of cyber attacks
Wed, 2nd Mar 2016
#
malware
#
ddos
#
breach prevention
Healthcare sector unprepared for cyber attacks, averaging one per month, according to ESET and the Ponemon Institute.

Point-of-sale malware attacks still strong in 2016
Wed, 2nd Mar 2016
#
malware
#
martech
#
commerce systems
Point-of-sale breaches will continue to be a major issue in the IT world in 2016, according to security firm Carbon Black.

What's the latest weapon in the fight against malware?
Wed, 2nd Mar 2016
#
malware
#
firewalls
#
network infrastructure
Palo Alto Networks embarked on a research project using known malicious servers to discover whether cookies can help understand malware identity.

New study shows CISOs not confident in their ability to protect
Wed, 2nd Mar 2016
#
isaca
#
rsa security
#
candidates
Cybersecurity professionals aren't confident in the ability of their teams to protect organisations beyond basic incidents according to a new report.

Centrify ups fight against enterprise attacks with 'MFA Everywhere'
Wed, 2nd Mar 2016
#
mfa
#
iaas
#
centrify
Centrify has launched a new initiative to secure enterprise identities against the most prevalent source of cyber attacks - compromised credentials.

Is there a way to sync, share and control data securely?
Wed, 2nd Mar 2016
#
storage
#
data protection
#
dr
As employees and partners collaborate through file sync and sharing services, sensitive data is often put at risk of compromise and non-compliance.

IBM doubles down on security with latest acquisition
Tue, 1st Mar 2016
#
cybersecurity
#
healthtech
#
ibm
IBM Security is set to expand its operations with the acquisition of Resilient Systems, specialists in security incident response solutions.

Going mobile: How to have secure file-sharing, backup recovery and access
Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation’s data in a world where your employees, contractors and partners are working on mobile devices?.

Stop bullying Apple around and start doing some intelligence homework
Tue, 1st Mar 2016
#
personal computing devices
#
apple
#
it industry
The FBI should stop bullying Apple and the technology industry and spend their time and energy instead on figuring out other ways of investigating.