How organisations can protect their print privacy in a digital world
Learning how to better protect the data used and stored by organisations’ print systems is in their best interests for the company’s future success.
How to recover from a ransomware attack faster and return to business acceleration
When an organisation can recover quickly from a ransomware attack, organisations can accelerate growth safely and reliably.
Proactively mitigate cyber risk with MISP and TheHive
When an attack happens, security teams should be ready with information about who is attacking and the steps being taken to mitigate damage.
DDoS attack report finds attack volumes up dramatically
The DDoS attack report analyses attack activity by industries, attack vectors, DDoS attacks on applications and on-premise versus cloud.
How SASE is helping organisations forge new digital work experiences
More organisations are reimagining the way that staff connect from remote locations, writes ThousandEyes principal solutions architect Mike Hicks.
Healthcare, manufacturing and finance sectors accounted for 62% of all cyber-attacks in 2020
The healthcare industry was the hardest hit, with 97% of all hostile activity targeted at the industry being web application or application-specific attacks.
Three ways to prioritise cybersecurity for maximum protection
CISOs should implement this three-pronged approach to prioritising cybersecurity concerns, writes Fortinet regional director for ANZ Jon McGettigan.
Spending on cybersecurity and risk management tech to hit $150 billion in 2021
“Looking ahead, we’re seeing early market signals of growing automation and further adoption of machine learning technologies in support of AI security."
Best practices and key factors for identity management
In parallel with any physical form of identification, digital identities must be protected at all costs to prevent identity theft or fraud.
The challenge of ensuring effective protection against DNS attacks
The ways in which bad actors can use DNS to mount attacks are numerous. Here are some of the most popular ones.
Video: 10 Minute IT Jams - SonicWall manager dissects zero trust security
Today’s interviewee is SonicWall head of presales for APAC, Yuvraj Pradhan, who discusses various talking points surrounding zero trust security.
Why DevSecOps must strive for effective enforcement measures
Threats to applications go beyond exploiting code and logic vulnerabilities which are already more than enough to analyse and cope with.
'Catastrophic forgetting': What it is, and how to prevent it
AI has been used to combat cyber-threats for years. But there are many related pitfalls — and catastrophic forgetting is a major one.
Protecting endpoints (and users) that have left the office
To access work emails, it may suffice to use with multi-factor authentication. But if users want to access customer data, that security control isn’t enough.
Why the rise of containers has created a vulnerability crisis
A rise in the use of Kubernetes and Docker services — and increased adoption of DevOps methodologies — have all contributed to the rise in popularity of containers. But as with all emerging technologies, there are risks.
A guide to combating Active Directory misconfigurations
With so many attacks abusing misconfigurations in Active Directory, it’s time to fix it, writes Attivo Networks regional director for ANZ Jim Cook.
Video: 10 Minute IT Jams - Who is Barracuda?
Barracuda is a cybersecurity company that provides security, networking and storage products based on network appliances and cloud services.
Six key characteristics of a modern secure web gateway
For organisations to continue to thrive in a distributed work environment, they must ensure that security is also modernised to support new realities appropriately.
Why organisations should make adaptability their #1 security requirement
Adaptability is the key to providing a strong security posture for organisations that are still weighing up their future scenarios to secure a workforce that is largely distributed versus one that’s mainly in the office.
97% of organisations experienced a mobile threat in 2020 — report
93% of these attacks originated in a device network, which includes attempts to trick users into installing a malicious payload via infected websites or URLs, or to steal users’ credentials.
Video: 10 Minute IT Jams - SonicWall VP on the cybersecurity lessons learned from the last 12 months
This is our seventh IT Jam with SonicWall, the cybersecurity company specialising in firewall, network security, cloud security and more.
Why a more secure organisation is a collective responsibility
With vast volumes of data moving to the cloud, many IT professionals are frequently challenged to protect their enterprise environment, and there is a greater focus being placed on advancing cybersecurity strategies.
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.