COMPANY NEWS: Taiwan-based threat intelligence company TeamT5, which became active in Australia late last year, is confident that its specialist knowledge will benefit ANZ organisations.
Automated cybersecurity specialist Forescout Technologies has introduced Forescout Frontline, a threat hunting service for organisations that lack the internal resources and visibility to defend themselves from cybersecurity attacks.
GUEST OPINION: There's no doubt the last couple of years have been interesting ones for ICT channel businesses. The curve ball that was COVID-19 brought unprecedented uncertainty to the market and triggered a tsunami of digital transformation. So, what does the remainder of the year hold in store? Here are five security-related trends your channel business should be across in 2022.
GUEST OPINION by Luke Smith, Regional Account Director, Barracuda MSP: Ransomware is rife but organisations that do the work may be able to avoid paying out, should the worst occur.
Expanded Reveal(x) Advisor services help organisations proactively manage cybersecurity hygiene and accelerate incident response
COMPANY NEWS by Extrahop: ExtraHop, the leader in cloud-native network detection and response (NDR), today announced expanded Reveal(x) Advisor services that provide threat detection and hunting capabilities alongside network assurance analysis. Reveal(x) Advisor provides dedicated ExtraHop threat analysts and security advisors that deliver timely and precise analysis of priority detections, hunt the network for indicators of current or future compromise, and continually probe for vulnerabilities, such as outdated protocol use or shadow IT.
Guest Opinion by Daniel Smith, head of research, Radware. Many of us are currently wrapped up in the SolarWinds and ProxyLogon events. But let's take a moment to highlight the risk that residential routers face from the propagation of IoT botnets and the problems devices present once they are infected.
The typical CISO deploys an average of 80 security tools in layers throughout their IT environment — including firewall, intrusion detection, SIEM, antivirus, threat intelligence, vulnerability management, forensics investigation, and many other technologies.
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]
I wonder when they will implement all of this, and what the pricing plans will be.FWIW, these days the proposed[…]