GUEST OPINION: The internet offers schoolchildren everywhere unprecedented opportunities for learning. In the classroom or at home, it provides vast amounts of essential information to support student course curriculum while also providing an essential place to communicate with fellow students, teachers and organisations across an ever-expanding range of platforms.
Access management specialist SecureAuth's new Arculix platform combines orchestration, passwordless technology, and continuous authentication. It can be deployed independently or in conjunction with incumbent identity access management products thanks to out-of-the-box integration with any industry standard identity provider.
COMPANY NEWS: Barracuda, a trusted partner and leading provider of cloud-first security solutions, has released key findings about the ways spear-phishing attacks are evolving. The report, titled Spear Phishing: Top Threats and Trends Vol. 7 – Key findings on the latest social engineering tactics and the growing complexity of attacks, reveals fresh insights into recent trends in spear-phishing attacks and what you can do to protect your business.
A new research report from Enterprise Strategy Group finds organisations are moving towards adopting passwordless, continuous authentication.
GUEST INTERVIEW: With passwords and traditional two-factor authentication no longer as secure as it once was, Yubico's evolving YubiKeys have been the next-gen answer, with the new YubiKey Bio now another step above in delivering an ever more secure environment, Geoff Schomburgk joined us again at iTWireTV to explain this and plenty more.
GUEST OPINION: Data Protection Day, impending in Europe, serves as a global reminder of one of the most important responsibilities for any organisation: keeping sensitive data secure.
GUEST OPINION: As Australian businesses strive to improve their IT security amid an ever-evolving threat landscape, increasing numbers are deploying multi-factor authentication (MFA).
GUEST OPINION: As businesses continue to emerge from the unforeseen disruptions of the past 24 months, many are fine tuning their strategic plans for the years ahead.
Cloud identity security solutions provider ThycoticCentrify integrates its platform with Secret Server, a privileged account and session management solution.
GUEST OPINION by Simon Howe, Vice President Sales Asia Pacific, LogRhythm: As businesses come to terms with the reality of operating amid the legacy of COVID-19, many are realising their old approach to IT security is no longer up to the task.
Guest Opinion by Anurag Kahol, CTO and co-founder of Bitglass. The past year proved to be a time of dramatic change for companies and consumers all around the world, as the shift to remote work led to a surge in cloud usage as users, devices, apps and data were forced to move off-premises.
Identity provider Okta's research shows a data breach could dislodge nearly half of a company's customer base.
With the COVID-19 pandemic shifting the spotlight back on the pesky security issue plaguing companies for years, that being of workers connecting to corporate networks from an ever growing number of devices, how does Veeam suggest you handle this issue?
A survey of 250 Australian chief information officers, chief technology officers and chief information security officers has found that both cyber attacks and breaches had risen during the last 12 months, prompting increased expenditure on cyber defences.
The Federal Government has warned that the telecommunications regulator ACMA is actively undertaking compliance checks to ensure mobile providers are complying with new measures and standards designed to protect Australians from fraud and identity theft, including mobile porting scams.
How do You Detect and Respond to Them?
GUEST OPINION By Louis Tague, Vice President, Australia and New Zealand, FireEye: As efforts to adjust to the “new normal” are forcing huge portions of Australians into remote working and outside the relative safety of their employers’ corporate networks, cyber risks have become top-of-mind even for employees who don’t work within security.
A new standard to mandate stronger identity verification processes before mobile numbers can be ported is being introduced in Australia as the Australian Communications and Media Authority (ACMA) steps up its fight against mobile number fraud.
Just a day after it issued a lengthy explanation of why its cloud multi-factor authentication failed last week, Microsoft has been hit by a similar issue again, with customers complaining that they have been unable to sign in to their Office 365 accounts.
Microsoft cloud customers using multi-factor authentication have been locked out of their accounts since Monday morning US time, the company's own status pages indicate.
The email breach at multinational accountancy firm Deloitte is claimed to have been much more widespread than the company has admitted, and compromised a server that hosted mail from 350 clients, including four US government departments and the UN.
What about all the customers they turned away and refused to fix their phones due to 'water damage'. I had[…]
....and Australia is no where to been seen...
Exactly. And the source document makes it clear that Assange is being pursued for his alleged involvement in the hacking,[…]
You can believe whatever you want. The source document is there for people to see the facts.
But Sam, you’ve just proved my point. The indictment “stems from” the publication of the material but it includes a[…]