COMPANY NEWS: Gigamon, the leading deep observability company, today announced the appointment of Shane Buckley as president and CEO, effective immediately.
COMPANY NEWS by George Tsoukas, ANZ Manager, Gigamon: The devastating effects of ransomware have continued to grow over the past two decades, which have seen it shift from just being opportunistic ‘smash-and-grab’ style attacks to carefully orchestrated attacks.
Security provider Vectra AI has appointed David Sajoto to the role of APJ vice president.
GUEST OPINION: The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
Cybersecurity provider Imperva has appointed Nelson Soon as vice president of Asia Pacific and Japan (APJ) channel sales.
.COMPANY NEWS: Gigamon, the leader in cloud visibility and analytics, today announced the latest release of Gigamon ThreatINSIGHT Guided-SaaS NDR™
Identity and access management specialist SecureAuth has appointed Paul Trulove to the role of CEO, and Mandeep Khera joins the company as chief marketing officer.
Cloud-native security provider Aqua Security has appointed Robert D'Amico to the role of APJ area vice president.
GUEST OPINION: Gigamon’s ANZ Manager, George Tsoukas has shared information on an often overlooked data security area. He explains that at its most basic, a network is a system comprises two or more computers sharing resources, data and communications, with the goal of accomplishing essential tasks more quickly and effectively.
GUEST OPINION by George Tsoukas, ANZ Manager, Gigamon: New technology always brings a host of worries about its negative potential, and 5G is no different. Although there are many legitimate 5G security concerns to address and discuss, it’s worth first clarifying the false claim that 5G causes health problems.
GUEST OPINION by George Tsoukas, ANZ Country Manager, Gigamon: The cloud is an extremely complex environment. To help ensure that organisations derive maximum advantage out of it, they need to be able to see exactly what’s happening at all times. They need cloud monitoring.
GUEST OPINION by Shehzad Merchant, Chief Technology Officer, Gigamon: Dealing with a security incident requires not just prompt notification of the incident but the ability to triage the cause of the incident.
COMPANY NEWS by Gigamon: Dealing with a security incident requires not just prompt notification of the incident but the ability to triage the cause of an incident, cautions Gigamon, leader in cloud visibility and analytics.
GUEST OPINION by Joe Slowik, Gigamon Principal Security Engineer, Applied Threat Research: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly in recent years. Historically, adversaries linked to state sponsors or similar activities would engage in data theft to further goals of industrial espionage or intellectual property theft.
GUEST OPINION by Joe Slowik, Gigamon: Network security operations generally and network security monitoring (NSM) evolve more specifically with technology like any other information technology (IT) field.
COMPANY NEWS by George Tsoukas, Gigamon: The internet is the most ambitious communication and data transference technology ever created. But with it advance come several challenges, and as we improve our ability to share large amounts of information between computers, servers and other digital devices, the risk of that data falling into unauthorised hands increases significantly.
GUEST OPINION by Joe Slowik, Gigamon: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly over the past few years.
Since grabbing headlines in early May, the high profile ransomware incident impacting the US oil pipeline system Colonial Pipeline has attracted significant attention from both media and information security spaces, given the event’s scope and impact.
What about all the customers they turned away and refused to fix their phones due to 'water damage'. I had[…]
....and Australia is no where to been seen...
Exactly. And the source document makes it clear that Assange is being pursued for his alleged involvement in the hacking,[…]
You can believe whatever you want. The source document is there for people to see the facts.
But Sam, you’ve just proved my point. The indictment “stems from” the publication of the material but it includes a[…]