GUEST OPINION by Simon Howe, Vice President Sales Asia Pacific, LogRhythm: As businesses come to terms with the reality of operating amid the legacy of COVID-19, many are realising their old approach to IT security is no longer up to the task.
Guest Opinion by Anurag Kahol, CTO and co-founder of Bitglass. The past year proved to be a time of dramatic change for companies and consumers all around the world, as the shift to remote work led to a surge in cloud usage as users, devices, apps and data were forced to move off-premises.
Identity provider Okta's research shows a data breach could dislodge nearly half of a company's customer base.
With the COVID-19 pandemic shifting the spotlight back on the pesky security issue plaguing companies for years, that being of workers connecting to corporate networks from an ever growing number of devices, how does Veeam suggest you handle this issue?
A survey of 250 Australian chief information officers, chief technology officers and chief information security officers has found that both cyber attacks and breaches had risen during the last 12 months, prompting increased expenditure on cyber defences.
The Federal Government has warned that the telecommunications regulator ACMA is actively undertaking compliance checks to ensure mobile providers are complying with new measures and standards designed to protect Australians from fraud and identity theft, including mobile porting scams.
How do You Detect and Respond to Them?
GUEST OPINION By Louis Tague, Vice President, Australia and New Zealand, FireEye: As efforts to adjust to the “new normal” are forcing huge portions of Australians into remote working and outside the relative safety of their employers’ corporate networks, cyber risks have become top-of-mind even for employees who don’t work within security.
A new standard to mandate stronger identity verification processes before mobile numbers can be ported is being introduced in Australia as the Australian Communications and Media Authority (ACMA) steps up its fight against mobile number fraud.
Just a day after it issued a lengthy explanation of why its cloud multi-factor authentication failed last week, Microsoft has been hit by a similar issue again, with customers complaining that they have been unable to sign in to their Office 365 accounts.
Microsoft cloud customers using multi-factor authentication have been locked out of their accounts since Monday morning US time, the company's own status pages indicate.
The email breach at multinational accountancy firm Deloitte is claimed to have been much more widespread than the company has admitted, and compromised a server that hosted mail from 350 clients, including four US government departments and the UN.
Ping Identity's chief executive and founder, Andre Durand, visited Australia to meet customers and the media, and took the time to talk to iTWire in a video interview.
Centrify’s David McNeely was in Australia to address delegates at the Gartner Security and Risk Management Summit. He had a strong message – infrastructure security is no longer good, better, best but danger, good, better, great and optimal. And very few reach the ultimate nirvana.
Not a day goes by without cyber criminals bragging about a data breach – from Ashley Madison to Sony. The fact is, no company appears to be immune to data breaches and hacks.
Has Jennifer put the Dud in Dudley-Nicholson?
The problem lies with so-called pundits who are trying to push a particular line and do not bother to verify[…]
If disinformation about the 2016 USA election was bad then the disinformation about the 2020 election was a disaster.The problem[…]
Why do you promote Wondershare Mockitt as a free alternative, given that its official page linked by you, clearly states[…]
Look, history has shown that if something can be done, then it will be done. The use of AI to[…]