Only 20% of organisations use cloud DLP – Bitglass
Each year, Bitglass conducts research on the state of enterprise cloud security in order to identify key trends and common vulnerabilities.
Conquer the cloud divide: Build, run, protect, and move ahead in the cloud
IT & OT convergence brings new cyber risks to industrial sector
Microsoft & OpenAI forge path into AI supercomputing
Amazon admits storing Alexa recordings until users take action
Huawei working to patch critical security vulnerabilities
Global banks fail to keep up with application security
Trend Micro delivers network security with AWS
Trend Micro Cloud Network Protection, available today, will be listed on AWS Marketplace.
McAfee: Channel opportunities in cybersecurity-as-a-service
Techday spoke to McAfee MVision Cloud Asia Pacific regional director Joel Camissar about the drivers and the effects of the industry trend of outsourcing cybersecurity.
Check Point releases report on public cloud security challenges
Unauthorised access, insecure interfaces, misconfigurations and account hijacking named as the biggest vulnerabilities in the public cloud.
IoT home connectivity on the up, as are cybersecurity threats
“This data helps us shed light on the global emergence of IoT and types of the security problems present in the devices real users own.”
Rapid increase in AI to detect fraud
"Criminals are finding new ways to exploit technology to commit schemes and target victims."
92% of businesses experience identity challenges - LastPass
Data from the report reveals IT professionals overwhelmingly (82%) agree that poor identity practices have exposed their business to risks.
Thycotic introduces certification programme to A/NZ
The programme enables cybersecurity service companies to provide technical support and professional services using Thycotic PAM solutions.
Cisco and Pure Storage team up on converged infrastructure solution
FlashStack enables enterprises to grow through maximum performance and reliability for business-critical applications, right out of the box.
Frost & Sullivan: How SIEM is either an enabler or a retardant
Addressing a constant flow of security alerts is an inevitable consequence of the digital age.
Tesla's suit against ex-employee a strong case for IP security
“There was no need for this employee to be using their own iCloud for data storage even if the original intent was non-malicious."
Report: Why vulnerability assessment is the first step in security strategy
Tenable’s latest research examines real-world vulnerability assessment practices at 2,100 organisations to see how they’re approaching cyber hygiene.
How to analyse data with SIEM to manage threats efficiently
Cybersecurity training institution SANS puts LogRhythm 7.2 Threat Lifecycle Management Platform to the test.
Case study: How Central Innovation prototyped the Nura headphones with SOLIDWORKS
Sound pioneer Nura had an ambitious concept to deliver when it raised almost two million dollars via crowdsourcing and then over five million dollars through a seed round.
Check Point research discovers new variant of mobile malware
“Agent Smith” malware automatically replaces installed apps with malicious versions without a user’s knowledge or interaction.
ESET's MSP program extends cloud business solutions
ESET specifically shaped the program so it’s easier for providers to work with a trusted industry leader and to reach a rapidly growing customer base.
Barracuda improves Azure connectivity for Office 365 security
New functionality enforces Office 365 local breakout policies in Microsoft Azure Virtual WAN to optimise Office 365 UX while increasing security.
Cyber threats: Legacy systems aren't always the culprit
There is a common misconception that product security is the only way to mitigate vulnerabilities and threats.
Wandera reports on the state of mobile security in financial services
“In the financial services industry, as in many sectors, the security of client information is the most important asset."
Application modernisation for the digital enterprise
The digital enterprise couldn’t exist without modern applications – otherwise it would be nothing more than a stale system that’s slow to react to the rapidly-changing conditions in today’s business environment.
NSS Labs recommends WatchGuard firewall for third year
NSS Labs testing focuses on the main differentiators for next generation firewall (NGFW) products: security, performance/functionality and cost.
CERT NZ report: Unauthorised account access a growing problem
New Zealanders reported direct financial losses of $1.7 million. While that is still a substantial loss, the figure is a 71% drop from the previous quarter.
Quest QoreStor update extends native cloud storage support
QoreStor 6.0 introduces a new Performance Tier accelerating backup, providing up to 2x recovery point objectives (RPO).
Businesses feel they need AI to respond to cyber-threats - Capgemini
Two in three organisations plan to deploy artificial intelligence to bolster their defense as soon as 2020.
CyberArk launches SaaS portfolio for privileged access management
The solutions solutions expand remote vendor and Just-in-Time access capabilities to maximise risk reduction.
Scam warning: Fake Google reviews and business listings targeting the vulnerable
"Essentially people are doing this because people are easy to scam when they are anxious, desperate or in trouble."