
Video: 10 Minute IT Jams – Who is ExtraHop?
Techday's 10 Minute IT Jams provide sharp, to-the-point insights into emerging and established technology companies that operate in the Asia-Pacific region.
ExtraHop is a company that’s all about delivering cloud-native network detection for the enterprise. Through its cloud-scale machine learning, the company provides visibility, detection and response.
In this interview, we speak with ExtraHop's A/NZ regional sales manager, Glen Maloney.
In this video, Glen explains:
- Who ExtraHop is, and what it does
- Why network detection and response is so important
- The company's recent integrations with other vendors, and how they benefit security and IT management
- How to contact the ExtraHop team.
Watch the video here.
Worldwide cybersecurity spending to increase 10% in 2021 — Canalys
ESET brings endpoint security platform to Australia
APAC secure content management market to hit $2.2 billion by 2024
Check Point uncovers live Linux attack, urges users to take action
Sophos named a Numbering Authority in CVE programme
IronNet expands Asia Pacific presence with new strategic partnership

Sophos Rapid Response puts out the ransomware fire
“Attackers are using a range of techniques and whichever defence has a weakness is how they get in. When one technique fails they move on to the next, until they find a weak spot."

Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.

Australians fear COVID-19 misinformation threat - study
Australians want to see greater transparency about the extent of the problem, new polling has found.

Cybersecurity spending to increase following SolarWinds hacking
Hackers breached software provider SolarWinds, directly infecting the company’s Orion software as well as several local, state and federal agencies.

SASE vs zero trust – or the best of both worlds
Zero trust and SASE work together by converging a least-privilege access strategy with an architecture that simplifies how highly distributed users, BYOD, and cloud resources are secured.

Cybercriminals leverage AI to sustain attacks on enterprises
What is less discussed is how cybercriminals are taking advantage of those very same technologies to automate their attacks, too.