Australia's leading source of security and threat news
These search results are from across the Techday network of sites
Fortinet’s internal segmentation firewalls: Securing the inner network
Once malware enters your network, it can move laterally virtually unopposed. Fortinet’s ISFWs protect your digital assets.
Security breaches: When, not if
Security breaches. It is no longer a matter of if a breach will happen, but when and how often.
Google suffers minor breach when third-party vendor accidentally exposes employee information
Google is one of the latest victims of a minor security breach after confidential information about Google Employees was sent to an outside business.
UK: Two Thirds of big business has been breached this year
The UK Government has sponsored a survey that reveals a significant fraction of businesses have been breached this year.
'The Red Team' discovers widespread Android vulnerability
"Since many flagship and non-flagship devices use Qualcomm chips and/or Qualcomm code, it's possible that hundreds of models are affected."
Majority of Aussie organisations have been breached in the past year
63 percent of Australian organisations have experienced at least one security breach or incident in the past year, according to a report by CompTIA.
Highlights of the Verizon Data Breach Report 2016
Here are my favourite “data-bits”, quotes and fun items from Verizon’s 2016 Data Breach Investigations Report.
Aussie PC users patching software vulnerabilities, but big challenges still remain
A recent study by Flexera Software had mixed results for Australia’s PC users - is the software on your PC safe?
Opinion piece: Are cybersecurity investments wasted money?
No matter how much money we throw into cybersecurity, it seems to have little impact on reducing the damage of breaches and attacks.
Fortinet’s Advanced Threat Protection: Secure your sensitive data, ensure your privacy
Securing your data and ensuring your privacy can be difficult tasks. Here is Fortinet’s five step solution to prevent the most persistent threats.
Wake up call: IoT security not up to scratch
“IoT environments exponentially increase the size of the attack vector since there are so many more devices, end points and applications to secure."
Salient Eye app catches Kapiti Coast thief
Salient Eye, a free Android home security app, has helped a family in Wellington catch an intruder trying to break into their home.
Meet the encryption flaw that's putting internet users at risk
LogJam allows an attacker to weaken what is believed to be a secure encrypted connection between a user and a server, according to Trend Micro.
How to prevent data breaches
Businesses are failing to protect themselves adequately from increasingly-sophisticated techniques used by cyber criminals, says Palo Alto Networks.