SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Security week stories

Story image
Samsung left Bixby & SmartThings code wide open to the public
Fri, 10th May 2019
#
smart home
#
software development
#
security week
Samsung's security oversight left Bixby and SmartThings code, along with key credentials, publicly accessible on GitLab, exposing 135 projects.
Story image
Another cryptocurrency exchange breached, but at least investors are safe
Thu, 9th May 2019
#
blockchain
#
cryptocurrency
#
breach prevention
Binance has been hacked, losing 7000 Bitcoin (USD $41 million) from its BTC hot wallet. Customer funds remain safe, covered by its Secure Asset Fund.
Story image
What your privacy means to Google - and what it's doing about it
Thu, 9th May 2019
#
google
#
security week
#
google i/o
Google has declared that it’s all about making privacy work for everyone – despite its long-held reputation as an information harvester.
Story image
Exabeam plans to use $75m fund to leave legacy SIEM vendors in the dust
Wed, 8th May 2019
#
siem
#
ueba
#
exabeam
Exabeam secures USD $75 million in Series E funding to boost sales, innovate product features, and outpace legacy SIEM vendors, aiming for market dominance.
Story image
Paranoid Android? Examining three key trends in Android malware
Wed, 8th May 2019
#
smartphones
#
ddos
#
wireless networks
It definitely doesn’t mean you are paranoid if you’re worried about Android security:  the threat landscape is growing in every dimension.
Story image
Cybersecurity will only work if we put people first
Tue, 7th May 2019
#
it training
#
cybersecurity
#
mimecast
Aussie data breaches reveal employee error; Tech not a fix-all for cyber threats, human-centric training urged.
Story image
Microsoft says NZ reasonably cyber secure, but don't get complacent
Tue, 7th May 2019
#
malware
#
ransomware
#
cryptocurrency
Microsoft's latest report heralds New Zealand as the least cyber-threatened in Asia Pacific, but warns against complacency in light of ongoing risks.
Story image
Leveraging cyber threat intelligence to benefit security posture
Tue, 7th May 2019
#
threat intelligence
#
threatquotient
#
security week
A recent SANS survey reveals 20% of companies are unsure of cyber threat intelligence's value, despite its crucial role in enhancing security posture.
Story image
It's 'lights out' for two more dark web marketplaces
Mon, 6th May 2019
#
cybersecurity
#
cybercrime
#
europol
Don’t be fooled if you see talk that Wall Street Market has been taken down – because it’s most likely not what you think.
Story image
D-Link security cams vulnerable to spying
Mon, 6th May 2019
#
smart home
#
d-link
#
home security
Security flaws in D-Link's DCS-2132L cloud cameras, discovered by ESET, expose users in Australia and New Zealand to potential spying and firmware attacks.
Story image
SecureWorks speeds up threat detection through analytics
Tue, 30th Apr 2019
#
data analytics
#
endpoint protection
#
martech
SecureWorks has embraced software-as-a-service (SaaS) to protect customers and transform the detect-investigate-respond process towards cyber threats.
Story image
CyberX IIoT security app now available on Cortex security platform
Mon, 29th Apr 2019
#
firewalls
#
network infrastructure
#
network security
Building on Cortex allows Palo Alto Networks Cortex partners to build cloud-based apps that deliver cybersecurity capabilities to joint customers.
Story image
Flashpoint announces new features on intelligence platform
Fri, 26th Apr 2019
#
cybersecurity
#
flashpoint
#
security week
The platform now features new dashboards and analytics, expanded datasets, chat services and communities, and industry alerting.
Story image
CrowdStrike: Improving network security with cloud computing solutions
Wed, 24th Apr 2019
#
firewalls
#
ddos
#
network infrastructure
Australian spending on public cloud services is expected to reach $6.5 billion this year according to Gartner.
Story image
Thycotic debunks top Privileged Access Management myths
Tue, 23rd Apr 2019
#
pam
#
iam
#
cybersecurity
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Story image
Veeam reports double-digit Q1 growth
Tue, 23rd Apr 2019
#
virtualisation
#
dr
#
multi-cloud
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Story image
Risky business: Avoid putting all your eggs in one basket
Tue, 23rd Apr 2019
#
cloud security
#
email security
#
cybersecurity
Many businesses that transition to the cloud blindly rely on a single cloud service provider for day-to-day security.
Story image
Is your SD-WAN solution leaving you vulnerable?
Mon, 26th Nov 2018
#
firewalls
#
network infrastructure
#
sd-wan
Providing direct internet access to cloud-based applications has made deploying new security strategies designed for the distributed enterprise critical.
Story image
SD-WAN deployments up, but networking and security challenges persist
Thu, 25th Oct 2018
#
network infrastructure
#
firewalls
#
sd-wan
The report, commissioned by Barracuda Networks, includes data from more than 900 respondents in the Americas, EMEA, and APAC.
Story image
Vodafone and Telstra partner to bring security solutions to NZ
Thu, 25th Oct 2018
#
partner programmes
#
edge security
#
vodafone
Vodafone security management services aim to help businesses navigate their security landscape and manage risk.