New phishing campaign disguises malware as CV attachments
It comes as resume or CV-themed scams have doubled in the past two months, with one out of every 450 malicious files reported involving CVs.
Thycotic acquires Onion ID, launches new access management products
New tech startup looks to help lawyers and finance pros
Months on, many organisations still don't have secure remote access - report
DigiCert receives top award from Frost & Sullivan thanks to agile approach
Dark web packed with offers to hack corporate networks
Managed services more popular than ever
Zscaler buys Edgewise, with its sight set on zero-trust
The acquisition indicates Zscaler's path towards improving the security of east-west communication, as well as its quest to achieve a zero-trust environment.
A winning proposition for critical infrastructure
When is a surveillance system more than a surveillance system? When it not only protects an organisation’s premises but also supports efficient, reliable operations, and health and safety.
Webinar: Build your threat-aware network
Security solutions are available for almost every perceived threat, but now it's becoming a challenge for some enterprises to juggle them all. Find out how to streamline your security network.
CrowdStrike expands Linux protection, adds machine learning prevention
CrowdStrike says its solution delivers proven breach prevention and visibility from its cloud-delivered platform via a single lightweight agent.
ExtraHop brings SaaS network detection and response solution to market
"Reveal(x) 360 is the culmination of a multi-year R&D investment to secure data centre, remote sites, and cloud workloads with frictionless deployment and actionable insights that can be securely accessed from anywhere.”
Why people must form the backbone of your security decisions
In a recent survey 74% Asia Pacific IT and business leaders surveyed declare that security culture is essential to a successful business.
FireEye revamps its flagship anti-malware solution
The Endpoint Security solution has received several enhancements, including the availability of several new modules for protection, investigation and response.
Automation: The key to business excellence across the board
In 2020, businesses that don't invest in automation face serious risk of falling behind. If it exists in IT, there's a way to automate it - find out how with a free consultation.
All we need to know about reverse proxy
To misquote George Orwell, not all cloud access security brokers (CASBs) are created equal.
Acronis teams up with A.S. Roma to advance AI in sport
Acronis has officially announced its artificial intelligence (AI) partnership with Associazione Sportiva Roma, an Italian professional football club also known as A.S Roma.
Dialing in from home: Why VPNs are essential for your corporate network
Right now, how many employees, partners, or contractors are working from home and logging into your network?
Cybercriminals after money more than anything else - Verizon report
Of all the things cybercriminals aim to accomplish in their illicit activities, money still takes centre stage.
The juggling act: Managing dynamic workforces and the risk that goes with them
Mitigate and continuously manage dynamic workforce risks, and continuously improve and maintain the maturity of your dynamic workforce risk program.
Proper authentication is the key to security. Now it's free
Usually if a cyber attacker gains access to your credentials, it's game over. Stand a fighting chance at no cost with this cutting edge authentication tool.
WatchGuard completes acquisition of Panda Security
Executives say the immediate goal of the now-combined companies is to provide stakeholders access to a newly expanded portfolio of security solutions.
HCL takes over Broadcom’s Symantec security consulting
As part of the partnership, the majority of Broadcom's Symantec enterprise consulting team will transition to HCL.
Swann releases two new smart security cameras
The solutions include tracking, night vision, and other features, supported by a connected application.
HackerOne hits $100M milestone with bug bounties
“We have arrived at the point in history where you are ignorant and negligent if you do not have a way to receive useful input from ethical hackers."
Five wine-tasting tips that should be applied to network security
What does network visibility really mean? Much like a blind wine tasting, we need to keep an open mind and trust what data is telling us without being biased by previous results.
ESET included in Forrester Enterprise EDR report
The report provides an overview of the technology players in the EDR market and offers insights into understanding their capabilities.
OSS Group helps businesses use IT Automation to unify people & processes
if it exists in IT there is usually a way to automate it. Whether you're a director or systems engineer, those that understand automation can achieve a more streamlined and secure business.
Chinks in the armour: Why the post COVID-19 cloud is easy game for cybercriminals
Now’s the time for CIOs to pause and make sure their digital transformation projects are fit for today, and the future.
IDC names Accenture APAC Leader in pro security services
Accenture was recognised as having one of the most comprehensive security advisory and security assessment offerings.
40% of APAC consumers have dealt with personal data breaches
The Kaspersky report released today also found out that more than 20% of respondents in APAC are willing to sacrifice their privacy to gain a product or a service for free.
How to deploy containerised apps in your cloud infrastructure
Move your business into the future - take advantage of a free consultation to pinpoint how container-based applications can propel your cloud infrastructure to new heights.
Rise in cyberattacks targeting the cloud as use of collaboration tools increase
“While we are seeing a tremendous amount of courage and global goodwill to overcome the COVID-19 pandemic, we also are unfortunately seeing an increase in bad actors looking to exploit the sudden uptick in cloud adoption."
Why shifting workforce demographics requires updated management
Globalisation; a younger workforce; remote working trends - the landscape of the modern workplace has changed forever. And businesses could be in for a shock if they don't manage it properly.
Channel guru brings Bufferzone to A/NZ
Previously, Wyman brought Backup Exec/Veritas, Brocade and StorageCraft to the region.
Thycotic launches DevOps Secrets Vault solution for greater cloud security
“DevOps Secrets Vault is a cloud-based vault that balances the security and velocity that DevOps teams require for this growing part of the enterprise attack surface."
Cybercriminals seeking greater anonymity online, Trend Micro states
Cybercriminals have switched to ecommerce platforms and communication using Discord for greater anonymity, according to new research from Trend Micro.
Webcast Series: Best security practices for a mobile workforce
Join an exclusive monthly webcast series to learn how to better secure your mobile workforce in the evolving threat landscape.
Interview: Thriving in lockdown - how a coding school in Vietnam beat the odds
It's March 10 2020, and CoderSchool in Ho Chi Minh just went entirely online. A success story followed - here's how a lockdown helped a school thrive.
Cloud, VPNs & digital workspaces: 3 focus areas for enterprise security
Authentication can bring three things to the table: Choice, appropriate risk analysis, and ease of use for everyone.
Chillisoft to distribute Imperva security solutions
“Imperva is an exciting addition ... they provide leading solutions for enterprise data security, web application, BOT protection, and CDN markets.”
New detection tool aims to catch Twitter bots in real time
Twitter recognises that it’s hard to tell just how much misinformation is out there on social media.
Demand for VPNs soars in Hong Kong amid fears over Beijing crackdown
VPN provider Surfshark revealed it has seen a week’s worth of sales in just one hour within the city, indicating that locals feel their internet freedom is under attack.
Current security practices 'grossly inadequate' for protecting cloud infrastructures - report
"As cloud stacks become increasingly complex, with new technologies regularly added to the mix, what's needed is a holistic approach with consistent protection across the full cloud stack."
Endace and Palo Alto Networks launch integration to empower security teams
“The combination of Cortex XSOAR’s powerful orchestration and automation capabilities with the rich network history recorded by the EndaceProbe Analytics Platform gives security operations access to the conclusive forensic evidence they need to respond quickly and accurately to threats.”
How to get cash back for your HP computer
For a limited time only, you can get your money back on your HP ProBook, ProDesk, ProOne, and more. Here's how.
11 new orgs join fight against insidious Stalkerware
Founded last year, the Coalition Against Stalkerware brings together cybersecurity vendors, domestic violence organisations, and digital rights advocates.
LogRhythm launches Remote Workforce Visibility with promotion
"We want to help teams get ahead of this situation and ensure they have the resources they need to be confident in their security abilities."
NZ's tech news sails in the slipstream of healthy tech sector
Techday's managing editor explains how New Zealand's tech media flies under the radar, but it doesn't mean we're dead.
Revealed: How to make authentication simple again
It's absolutely necessary for a healthy security landscape, but authentication has become convoluted and bogged-down. Simplify and secure your processes with this tool.