Lateral phishing: The latest in email account takeover
"One of the most striking aspects of this emerging attack is the scale of potential victims that the attackers target."
Genetec announces new line of hybrid access control and intrusion hardware
Securing your organisation through DX vulnerabilities
Druva acquires hybrid cloud data protection firm
Quest QoreStor update extends native cloud storage support
Protecting remote staff from phishing attacks – WatchGuard
Check Point research discovers new variant of mobile malware
Enterprise at tipping point, says Symantec
Enterprises are struggling to keep up with the rapid expasion of cloud within their business.
Report: Using UEBA to increase security analytics effectiveness
To facilitate more effective cybersecurity, businesses need to accommodate larger data sets with more advanced analysis of the data.
BlackBerry launches new threat hunting solution
CylanceGUARD is a subscription-based offering that validates, triages, analyses, prioritises, and automates analyst and incident engagement.
RSA responds to increasing A/NZ regulations with new updates
The new data protection and privacy management capabilities will help business in the A/NZ region to better ensure data protection and privacy regulations and compliance, according to the company.
Thycotic introduces certification programme to A/NZ
The programme enables cybersecurity service companies to provide technical support and professional services using Thycotic PAM solutions.
Why 5G and AI will determine cybersecurity strategy for the next decade
"We all stand on the threshold of a new era of cybercrime."
SecOps launches new DNS service powered by Cisco
“The way people work now is making it really hard for security and IT teams to secure organisational information in the traditional sense."
92% of businesses experience identity challenges - LastPass
Data from the report reveals IT professionals overwhelmingly (82%) agree that poor identity practices have exposed their business to risks.
Marriott, British Airways fines highlight critical need for security investment
The last week has brought heavy fines against the likes of global hotel chain Marriott and airline British Airways, casting a harsh spotlight on the price of cyber attacks.
Report: Why vulnerability assessment is the first step in security strategy
Tenable’s latest research examines real-world vulnerability assessment practices at 2,100 organisations to see how they’re approaching cyber hygiene.
Tesla's suit against ex-employee a strong case for IP security
“There was no need for this employee to be using their own iCloud for data storage even if the original intent was non-malicious."
UPDATED: Orvibo & Arlo smart home products patched to prevent attacks
The security of smart home devices is once again under the spotlight this week, as two different device manufacturers come under fire for major vulnerabilities.
Bitdefender advances endpoint security solution for SecOps teams
“Rather than rely on a pure prevention or pure detection/response model, the most secure organisations will weave in strong prevention and speedy detection/response with integrated risk analytics.”
Wandera reports on the state of mobile security in financial services
“In the financial services industry, as in many sectors, the security of client information is the most important asset."
Changes to Aruba's South Pacific line up
Aruba names new director for A/NZ business as Anthony Smith moves into APJ channel role
Probax launches Dropbox backup solution for MSPs
The solution gives businesses a backup of their Dropbox data and extends the retention of data beyond the native data recovery limits of Dropbox.
Amazon admits storing Alexa recordings until users take action
Amazon’s Alexa voice service is storing all user voice recordings and transcripts on its servers by default – and people who want to delete those recordings must do so manually.
Responsible AI starts with responsible leaders - PwC
Responsible practices in artificial intelligence (AI) starts with how each individual organisation plans to strategise, design, develop, and deploy the technology.
Whitepaper: Measuring SIEM’s ability to create actionable defence
Many organisations are struggling to keep pace with the speed in which hackers are attacking their system.
Conquer the cloud divide: Build, run, protect, and move ahead in the cloud
Find out how to build hybrid applications and run them seamlessly, no matter where they are.
The future of cybercrime in Australia – ESET
Cyber-attacks will continue so long as the target seems worthwhile and the attackers have funding to continue their work.
IoT home connectivity on the up, as are cybersecurity threats
“This data helps us shed light on the global emergence of IoT and types of the security problems present in the devices real users own.”
Cyber threats: Legacy systems aren't always the culprit
There is a common misconception that product security is the only way to mitigate vulnerabilities and threats.
Trend Micro delivers network security with AWS
Trend Micro Cloud Network Protection, available today, will be listed on AWS Marketplace.
Check Point releases report on public cloud security challenges
Unauthorised access, insecure interfaces, misconfigurations and account hijacking named as the biggest vulnerabilities in the public cloud.