The hidden cyber guardian behind Australian schools
We look under the hood at a home grown Australian cyber security company who focuses on the school market.
Keyfactor and Thales announce integration to fight code signing cyber-attacks
Exclusive: Veeam’s business development VP looks ahead
Untagged data a major risk to businesses - Veritas
Cloud-based ID card issuance will reinvent government processes
Integrating the entire team in the cyber defence strategy
Check Point launches cloud security analytics solution
Case study: City University ups ransomware defences after attack
After recovering from this ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
Whitepaper: Three keys to understanding the SaaS security landscape
Organisations worldwide can ensure more effective implementations by including three essential elements in their overall SaaS security strategies.
Whitepaper: Data management strategies for a new information management environment
Companies are finding that their older, legacy archive strategies are increasingly ineffective in the new regulatory environment.
Whitepaper: Equipping your DNS with security, availability, and integrity
Attackers can conduct DNS attacks, including DDoS attacks that can take servers offline for minutes, hours, days, or even weeks.
Practical steps to selling cloud security-as-a-service
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world.
Preventing cyber attackers from exploiting your behaviour
Too often, time, resources and conflicting priorities push cybersecurity education to the bottom of the list.
'Visual hacking' a privacy risk to business travellers
While 8 out of 10 business travellers consider visual hacking a threat, they don’t do much about it.
Credentials install base set to hit 11 billion by 2023
The number of smart card shipments is forecast to increase from 618.8 million in 2018 to 732.7 million in 2023, according to ABI Research.
One Identity: How to mitigate the risks of spearphishing
Targeting one company rather than casting a wide net allows threat actors to take a more sophisticated approach.
SolarWinds updates network management portfolio
Aims to deliver expanded flexibility, scalability, and visibility across complex environments.
Building a hybrid cloud strategy with VMware Cloud on AWS
A roundtable discussion brought CIOs together to discuss achieving cost and performance efficiencies for organisations moving towards hybrid cloud.
Experts comment on US Customs data breach
The United States Customs and Border Protection agency has been responsible for the leaking of tens of thousands of images of travellers and license plates.
Facebook jumps on the cryptocurrency bandwagon
Launching in 2020, Calibra and Libra may shake up the mobile payment industry.
Breach checking website Have I Been Pwned is up for grabs
The man behind the popular breach checking website Have I Been Pwned is stepping down from his esteemed post as sole manager of the site.
Are businesses spoiled for choice when it comes to their security options?
"Businesses need to understand which of the myriad available solutions will deliver real results."
Renewed concerns over use of personal data, according to survey
“There is wide appeal for more permissions over how organisations access their identity data, and the choice to view and manage this in one secure place."
CASE STUDY: Prototyping key to success when challenging design assumptions
Central Innovation helped Nura leverage CAD software SOLIDWORKS to refine and prototype the Nuraphone, culminating in a product that won the Best Innovation in Headphones category at consumer goods conference CES this year.
Frost & Sullivan’s key factors for selecting a SIEM
“In practice SIEM is either an enabler in reaching a higher tier of productivity and proficiency; or a retardant due to limitations in adaptability and scalability."
Ping Identity releases capabilities framework for zero trust deployments
The Ping Identity model provides numerous starting points for architecting Zero Trust security.
IRD shuts down fraudulent direct debit scam
“We’re working with the police and banks to investigate further and anyone who has been left out of pocket will be reimbursed."
Watch: How your organisation is most vulnerable to threats from the inside
90% of global organisations have seen phishing attack volumes increase and 40% have seen the volume of impersonation attacks increase.
Cyber attacks on healthcare companies growing
“The potential, real-world effect cyberattacks can have on healthcare organisations and patients is substantial.”
Researchers create AI-enabled computer keyboard malware
Researchers at Israel’s Ben-Gurion University of the Negev have created a proof-of-concept attack that can mimic the way people write via their computer keyboards.
A10 Networks adds zero-day automated protection (ZAP) to DDoS Defence
Today’s DDoS attacks are more prevalent, multi-vector in nature and morph over time.
HID Global launches ID verification solution
The HID goID Simple Verifier is a small device that can be used by anyone seeking to quickly verify the age of citizens carrying a HID goID mobile ID on their smartphones.