GUEST OPINION: Artificial Intelligence (AI) is rapidly becoming an important of business strategy, promising increased efficiency, reduced costs, and innovative solutions. As with the use of any new technology, comes the risks associated with the use of the technology.
GUEST OPINION: The security end goal for all organisations is cyber resilience. Effective prevention and detection measures are, and will remain, a critical cornerstone of security strategies, but companies shouldn’t stop there. What matters is how the organisation prepares for, withstands, responds to, and recovers from an incident. And this depends on people and processes as much as it does on technology.
COMPANY NEWS: Delinea, a leading provider of solutions that seamlessly extend Privileged Access Management (PAM), today announced industry-first innovation to protect organisations from threats in the post-quantum computing era with the availability of quantum-safe encryption of secrets and credentials on the Delinea Platform.
GUEST RESEARCH: Commvault has released a new report that found the traditional silos between ITOps and security teams are beginning to break down, as organisations realise the importance of increased collaboration to combat the onslaught of more sophisticated cyber attacks.
GUEST OPINION: 28 January is Data Privacy Day — known as Data Protection Day in Europe. Data privacy is about deciding who may have access to what information, while data protection is about safeguarding that information. A data breach blows both out of the water.
COMPANY NEWS: Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, today introduces support for hardware security keys as a single Two-Factor Authentication (2FA) method.
COMPANY NEWS: The world has changed considerably in the last 12 months.
COMPANY NEWS: Pax8, the leading cloud commerce marketplace, has announced its partnership with Blackpoint Cyber, a trailblazer in cybersecurity, offering a cutting-edge Managed Detection and Response (MDR) platform.
GUEST OPINION: VPNs – virtual private networks – have been relied on by organisations for many years, a popular option for providing secure access to corporate data from a remote device that could be running over an insecure link, such as a home or public Wi-Fi network. A VPN carries the user’s data in an encrypted tunnel, masks their IP address and hides details of their browsing activity from their internet provider, or anyone seeking to view it.
GUEST OPINION: Today is World Password Day. Below, ManageEngine vice president Manikandan Thangaraj shares his insights on the relevance of passwords today.
GUEST OPINION: Faster cybersecurity operations is underpinned by interoperability.
COMPANY NEWS: Entrust, a leading provider of trusted identities, payments, and data protection solutions, has announced four new solutions aimed at helping organisations prepare for the security challenges and opportunities presented by quantum computers.
GUEST OPINION: Migrating to the cloud is no longer a forward looking trend: it's the industry mainstream, with about 70% of production applications running in the cloud. Clearly, cloud security is becoming synonymous with cybersecurity.
GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises worldwide, exploring the obstacles and threats organisations face when protecting AD and how they adapt to address these growing concerns.
A forthcoming documentary promotes the idea that sustainability should be a major focus for quantum technology.
GUEST OPINION by Jim Cook, ANZ Regional Director at Attivo Networks: When the global SolarWinds cyberattack came to light earlier this year, it sparked grave concerns across private and public-sector organisations. If attackers could use software from a trusted vendor to breach defences, how could security ever be guaranteed again?
Hardware authentication security key provider Yubico today announced the general availability of its next-generation FIPS security keys, the YubiKey 5 FIPS series. This is the industry’s first set of multi-protocol security keys with FIDO2 and WebAuthn support to receive FIPS 140-2 validation.
The ranks of Australian startup Silicon Quantum Computing (SQC) have been boosted with the arrival of John Martinis.
Research published recently by NIST has found an extensive economic advantage from the use of AES.
Outgoing US president Barack Obama issued executive order 13636 in February 2013, directing the US National Institute of Standards and Technology (NIST) to work with stakeholders to develop a voluntary framework — based on existing standards, guidelines, and practices — for reducing cyber risks to critical infrastructure.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]