Technology services and solutions provider Data#3 has partnered with SecurityHQ to expand its managed security services, adopting an approach that provides access to people, processes, and technology to detect and remediate sophisticated threats, violations, and incidents.
GUEST OPINION by George Tsoukas, ANZ Country Manager, Gigamon: The cloud is an extremely complex environment. To help ensure that organisations derive maximum advantage out of it, they need to be able to see exactly what’s happening at all times. They need cloud monitoring.
BlackBerry’s Research and Intelligence has released its "Old Dogs New Tricks" research paper which examines how threat actors are sneakily leveraging new and uncommon programming languages to evade detection and hinder threat analysis.
Talking to prospects teaches more than reading market research. Recent customer engagements (unfortunately still virtual) made it loud and clear – businesses need effective security.
Sophos launched its XGS Series firewall appliance, “the most advanced and significant hardware that it has ever released with the most unmatched detection, protection, and speed,” which protects users’ network from the deadliest threats and cyberattacks.
The new report outlines how ransomware, malicious spam, mobile malware and other threats to consumers evolved during the COVID-19 pandemic.
2020 was both challenging and disruptive for everyone. In Australia, just when we’d become optimistic about the economic and societal recovery after the devastating summer bushfires, the COVID-19 pandemic struck. For most organisations and their employees, two words summarise the year that unfolded as a result—remote working.
Westpac has announced new measures intended to reduce the use of online and mobile banking to send abusive messages.
2020 has shown us that we live in a very uncertain world, and with cybercriminals upping their game to devastating new levels this year, the world needs reliable cybersecurity more than ever - so what can we expect in 2021?
GUEST OPINION* Jim Cook Attivo Networks. Security traditionally leans on risk and relationships to get the job done, but could use some stronger metrics to show its efficacy and value
Security operations centres are a critical line of defence for many organisations against the threat of attacks, data breaches and other security concerns.
Fewer than one-third of organisations can accurately predict the impact of threats and vulnerabilities associated with emerging tech, despite facing increased risks over the past year, according to research from the global ICT professional association ISACA, CMMI Institute and Infosecurity Group.
There are no universal standards for a vulnerability database but the US national vulnerability database was the first to be set up and has set the norms for others, a researcher at the threat intelligence firm Recorded Future says.
In an ever evolving threat landscape, new strategies are required to stay one step ahead of both the bad guys and competitors in the war to win data security for customers – without inhibiting end-user productivity.
Malicious scripts written using the Windows PowerShell framework are on the increase, Symantec has warned after a study by researchers found that 95% of analysed scripts fell into this category.
With an 80% increase in fraud attacks detected and stopped year-on-year, Threatmetrix’s detailed 33-page report is a must-read cybercrime thriller.
Last month, BAE launched its cloud-based cyber security suite in A/NZ, starting with its Email Protection Services in the face of ever evolving cyber attacks.
iTWire interviews ESET Malware Researcher Olivier Bilodeau, on his way to be one of the speakers at the 2015 Linux.conf.au conference, presenting on advanced Linux server-side threats.
Venafi is a US based security company that secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks.
It’s no big secret that Bring Your Own Device (BYOD) policies and a huge increase in data security concerns are presenting fresh challenges for Australian businesses, but what might be more secret is the fact that security breaches are more likely to originate from employees inside a company rather than from outside organisations.
McAfee's latest security report underscores the huge gap in IT security between perception and reality.
I've gone to No Landline at all (never thought that would happen) with a 100GB/month mobile plan which includes unlimited[…]
I too have a copy of the document.
I wasn’t speaking for Labor. I was speaking as a fellow journalist aware of what actually happened. I don’t know[…]
No, you do not. I have not linked to any source. Some random quote is irrelevant to this story.
Why wasn't it sent to us? It was sent to some small outlets that are definitely not mainstream. How can[…]