GUEST RESEARCH: Radware (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, has been named a Strong Performer in The Forrester Wave: Web Application Firewall Solutions, Q1 2025. Radware was among the 10 top web application firewall (WAF) vendors included in the market overview.
Telstra, one of the connectivity suppliers for the Formula 1 Australian Grand Prix, supported an unprecedented 94 terabytes of data consumed on its network over the four-day event – the highest ever recorded at the event, including double the 5G traffic recorded in 2024.
Compact floor-mounted fiber frame solution simplifies and accelerates management in high-density data centres
AI-powered threat defence to process billions of machine events and seamlessly integrate with existing security solutions to boost detection response and reduce risks for users of Microsoft Security tools
GUEST OPINION: Accurate attribution of the root cause of issues, and optimal determination of resolution pathways, is considerably aided by a focus on assurance.
COMPANY NEWS: Secure and scalable, Cloudlink 210 bridges on-premises systems to the cloud and features cybersecurity protection for existing devices.
New feature turns complex data into confident growth strategies, taking the risk out of location decisions
COMPANY NEWS: Check Point CloudGuard recognised for superior performance in WAF & API security and threat prevention, showcasing robust cloud security solutions
Infoblox operates in the DDI (DNS, DHCP and IP address management) space, working with network security and cloud security operations and has done for the past 25 years. It was recently in Sydney and told us about its new networking product.
The partnership integrates some of the best-in-class cloud network and CNAPP security through seamless technology integration and a strategic business alliance, setting a new standard for enterprise protection.
New coherent optical technology allows Southern Cross to ride the Terabit wave
While organizations pour resources into advanced threat detection systems and cutting-edge security tools, they often miss fundamental elements that could make or break their cybersecurity defenses. These overlooked components create vulnerabilities that sophisticated attackers are all too happy to exploit.
Recent reports about the potential ban of TP-Link products in the U.S. have highlighted a growing concern: the security and reliability of the network devices we rely on daily. As smart devices continue to proliferate in our homes, so do the risks they bring — from cyberattacks to vulnerabilities that expose personal data. With these issues coming to the forefront, taking proactive measures to secure your home network has become more essential than ever. In this article, we will explain how to protect your home network and the importance of network segmentation.
GUEST OPINION: Australian parliament recently passed the country’s first standalone Cyber Security Act, which brings in a range of additional legislation and protections around reporting ransomware incidents and sharing of information.
Craig Sanderson, Vice President of Security Products and Scott Harrell, CEO of Infoblox. who has extensive experience in security solutions, outlines the growing role of legislation in the fight against cybercrime. While Scott, with an extensive background in product and security engineering, dives into the need to unite and automate workflows across cloud, security, and networking so customers can have the confidence to move fast and scale up.
Nowadays, businesses are constantly threatened by cyber criminals exploiting security vulnerabilities in their systems. One of the most common ways these breaches occur is through neglecting regular updates and patches to software, particularly Windows operating systems. Failure to manage these patches effectively can lead to disastrous outcomes.
GUEST OPINION: It’s been a big year for automation in Australia. Against a backdrop of widespread efficiency drives, the technology has proven its effectiveness and value across a broad array of use cases, easing the administrative burden on lean operational teams and helping them to absorb growing business-as-usual demands without a linear increase in costs.
COMPANY NEWS:
Key highlights:
GUEST OPINION: In today’s digital age, business relationships are no longer confined to the bricks-and-mortar office. Organizations depend on a complex, often global, network of vendors, suppliers, and third-party partners. With B2B relationships, sharing sensitive data is necessary for collaboration and efficiency, but this presents its own set of challenges.
COMPANY NEWS: Partner program evolution to accelerate growth opportunities and value for Dayforce partners
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]
I wonder when they will implement all of this, and what the pricing plans will be.FWIW, these days the proposed[…]