• Subscribe to Newsletter
  • Advertise
iTWire iTWire iTWire
  • Home
    • About iTWire
    • About iTWire - Advertising, Sponsored Posts, Editorial & Press Releases
    • About our News site
    • Advertise in Newsletter
    • Advertise on iTWire
    • Advertising Specs
    • Advertorials
    • Commswire Subscription
    • Contact CEO
    • Contact Editor
    • Current Webinars
    • Interviews
    • iTWire News Site Editor
    • Lead Generation
    • Newsletter Editor
    • Our Journalists
    • Press Releases
    • Promotional News
    • Reviews
    • See Latest Newsletter
    • Commswire Newsletter Example
    • Sponsored News
    • Webinar Promotion
    • Zoom Interviews
  • Your Tech
    • Browse News
      • Mobility
      • Home Tech
      • Wi-Fi
      • Apps
      • Internet of Things
    • Entertainment & Gaming
  • Business
    • Browse News
      • iTWire Marketing
      • Networking
      • Open Source
      • Security & Cybersecurity
      • Business Telecommunications
      • Enterprise Solutions
      • Print Solutions
      • Hardware
      • Storage & Cloud Storage
      • Business Software
      • Cloud
      • Data Analytics & Artificial Intelligence
      • Data Centres
      • MVNO
      • Managed Services
      • Accounting Software
      • Business Intelligence
  • Industry
    • Browse News
      • Deals
      • Channel News & Partnerships
      • Cloud Accounting
      • Enterprise Cloud
      • Virtualisation
      • Web Development & Front-End Development
      • Telecoms & NBN
      • Manufacturing & Logistics
      • Web Hosting
      • VoIP
      • Strategy
      • Listed Tech
      • Market
      • Application Performance
      • CRM & Contact Center Apps
  • People
    • Browse News
      • Career Coach
      • Recruitment
      • Not For Profit
      • Education & Machine Learning
      • People Moves
      • CIO Trends
      • Enterprise Staff
      • Remote Working
  • GOVT
    • BROWSE NEWS
      • Government Tech Policy
      • Technology Regulation
      • Technology Tenders
      • Local Government
  • Science
    • Browse News
      • Energy
      • Climate
      • Health
      • Biology
      • Automotive
      • Space
    • Water Resources
    • Environment
    • Mining here
  • Opinion
    • Browse
      • Apexing the Linux learning curve
      • ShrinkAge
      • The Big House
      • Fuzzy Logic - Alex Zaharov-Reutt
      • Seeking Nerdvana
      • Open Sauce - Sam Varghese
      • A Meaningful Look
      • Transit
      • Business Intelligence Blog
      • ShawThing
    • Browse
      • Stephen Withers
      • Whiskey Tango Foxtrot - David Heath
      • Linux Distillery - David M Williams
      • UNI-verse
      • Radioactive IT
      • Cornered!
      • Beerfiles
      • ICT Energy and Sustainability
      • Wired CIO - David M Williams
      • C Level
  • Reviews
    • Browse
      • Computers & Peripherals
      • Smartphones & Mobile Devices
      • Software
      • Networking
      • Books
      • Games
  • Guest Articles
    • Guest Opinion
    • Guest Reviews
    • Guest Interviews
    • Webinars & Online Events
    • Guest Research
    • Company News
  • CHANNELS
  • ITWIRE TV

Total: 301 results found.

Search for:
Search Only:
1. Yubico launches ‘enhanced’ YubiEnterprise Subscription program.
(Security)
... and their customers against malicious hackers and sophisticated attacks like phishing.” Yubico says that with the latest enhancements to YubiEnterprise Subscription, and the expanded Security Key ...
Created on 31 January 2023
2. Macquarie Government and Australian Taxation Office renew cyber security contract
(Security)
... attacks by Macquarie’s SOC. Macquarie Government provides SIG and other cyber security services to approximately 42% of the Federal Government based on staff headcount. Macquarie’s SOC provides a full ...
Created on 31 January 2023
3. Yubico is Key to ‘23: YubiEnterprise Subscription brings the gold-standard of authentication to enterprises
(Company News)
... expanded Security Key Series, and updated pricing structure. With the onslaught of today’s sophisticated attacks specifically targeting enterprises, these updates will help better equip organisations ...
Created on 31 January 2023
4. Abraham’s Ax emerges as new persona from Iranian hacking group Cobalt Sapling targeting Saudi Arabia for political leverage
(Company News)
... in exchange for payment. The group obfuscates their intent behind criminal and hacktivist style tactics but operates without a clear profit motive, with the attacks appearing to be politically motivated ...
Created on 30 January 2023
5. iOS 16.3 now supports security keys
(Security)
... giving the best cybersecurity defence against your credentials being stolen during a data breach or via a phishing attempt. “With 90% of breaches being tied to stolen credentials from phishing attacks, ...
Created on 27 January 2023
6. Arrow Electronics signs with QuSecure to become ‘First Large Technology Provider’ to broadly distribute Post-Quantum Cybersecurity
(Deals)
... to Arrow Electronics’ more than 220,000 commercial and federal channel partners to help them secure networks, communication and data from classical and quantum cyberattacks. By teaming with QuSecure, ...
Created on 27 January 2023
7. School staff need to increase focus on cybersecurity: survey
(Guest Opinion)
GUEST OPINION: Despite the recent wave of high-profile cyberattacks targeting businesses, schools also need to ensure that they are constantly aware of the risks they face. The State of Cyber Resilience ...
Created on 27 January 2023
8. US hits Windows Hive ransomware operations, seizes decryption keys
(Security)
The US has taken down the Hive ransomware group that attacks Windows, the Department of Justice claims, adding that the campaign to effect this had been going on since July last year. In an announcement ...
Created on 27 January 2023
9. Crypto crime a 'pressing concern' for governments, says CryptoMonda
(Market)
... money laundering, and ransomware attacks. CryptoMonday says urgent intervention is needed to stem the services. “The US Treasury Department's Office of Foreign Assets Control (OFAC) has taken up this ...
Created on 26 January 2023
10. ‘Increased cyberattacks’ on fashion businesses: Tenable
(Security)
Rapid digitisation has forced fashion brands to reimagine how shopping in the digital world takes place, but a more interconnected retail experience has increased the number of cyberattacks on fashion ...
Created on 25 January 2023
11. Cybermindz.org Fundraising Gala Dinner, Feb 28: burnout recovery and prevention is real
(Security)
With cyber security professionals and the organisations they defend under relentless and increasing attacks, burnout has never been more real - but now there's a way to defend our defenders, with Cybermindz.org ...
Created on 25 January 2023
12. LogRhythm ‘enhances security analytics’ with expanded security operations capabilities
(Security)
... a “much-needed force multiplier for overwhelmed security teams who are expected to confidently, effectively, and efficiently defend against cyberattacks”. Following the October launch of LogRhythm Axon, ...
Created on 23 January 2023
13. Australia is well set up to be a leader in IT/OT convergence
(Guest Opinion)
... their defences may be lowered during the convergence process, leaving them vulnerable to attacks while actual convergence work is underway. Additionally, cultural differences in approach can leave converged ...
Created on 23 January 2023
14. Chinese 8220 Gang targets public clouds and vulnerable applications
(Guest Research)
... and wipers. • The Tsunami IRC is a bot used as backdoor, allowing the threat actors to remotely control systems and launch distributed denial-of-service (DDoS) attacks. • Many organisations have limited ...
Created on 20 January 2023
15. Why you need to make cybersecurity an urgent priority
(Security)
Geopolitical uncertainty, rapid Internet of Things (IoT) adoption, and accelerated digitalisation will continue to fuel cyberattacks in the years to come. In the 2021-22 financial year, the Australian ...
Created on 19 January 2023
16. Cohesity appoints Victor Keong as Field CISO for Asia-Pacific & Japan
(Company News)
... resilience approach and strategies.  "Cyberattacks, especially ransomware, are one of the top business concerns challenging C-level executives and boards, which is why I’m delighted to have Victor join ...
Created on 19 January 2023
17. Deep Fakes may replicate digital humans this year
(Security)
... financial exposure caused by data breaches and ransomware attacks, the need to get a solid cyber strategy in place will be mandated to get cover. The days of “cheap and easy” are over and this year, ...
Created on 19 January 2023
18. Nozomi Networks Labs report finds ruin vs. ransom dominates 2022 threat landscape
(Guest Research)
... the trend that was observed in the first half of 2022, Nozomi Networks Labs researchers saw hacktivists shift tactics from data theft and distributed denial of service (DDoS) attacks to utilising more ...
Created on 19 January 2023
19. Why software patching is critical for effective IT security
(Guest Opinion)
...  Software vendors are constantly releasing updates to their code designed to plug security holes and ward off attacks. However, unfortunately, many of their customers are failing to take advantage of ...
Created on 19 January 2023
20. Rubrik surpasses $500 million in subscription ARR; appoints former Palo Alto Networks chairman and CEO Mark McLaughlin to board of directors
(Company News)
... like Mark at our side.” According to the recent Rubrik Zero Labs State of Data Security report, IT and security leaders revealed their organisation experienced 47 cyberattacks in the past year – or nearly ...
Created on 19 January 2023
21. Why Zero Trust is the Best Security Strategy for 2023
(Guest Opinion)
... attacks and credential theft. Traditional IT security measures are unlikely to prevent intrusion by a cybercriminal who has valid access credentials. The case for zero trust has also been strengthened ...
Created on 18 January 2023
22. Digital Trust now critical for maintaining customer loyalty
(Guest Opinion)
... attacks 4x more likely to be using zero trust policies 3x more concerned about social engineering attacks 2x more concerned about spyware 1x more likely to be engaged with PKI automation Top-tier ...
Created on 18 January 2023
23. Jamf ends 2022 helping approximately 71,000 customers succeed with Apple
(Company News)
... and protect end users as workers sign in from everywhere and cyberattacks continue to make headlines," said Jamf CEO Dean Hager. "We're proud of the way Jamf has uniquely been able to help our 71,000 customers ...
Created on 18 January 2023
24. Samsung unveils new PC SSD
(Business IT)
... that develops open standards for computing security. Dice securely generates cryptographic keys inside the SSD, providing device authentication to protect against supply chain attacks — cyberattacks ...
Created on 17 January 2023
25. Delinea 2022 State of Ransomware Report Reveals That U.S. Attacks are Down
(Security)
... up in the fight against ransomware. Cyber-attacks using the popular compromising tactic have declined significantly over the past 12 months compared to the previous year, and fewer companies are paying ...
Created on 17 January 2023
26. Radware launches new cloud security centres in Australia and New Zealand
(Company News)
... will reduce traffic latency as well as increase service redundancy and mitigation capacity to help customers defend against denial-of-service attacks, web application attacks, malicious bot traffic, and ...
Created on 16 January 2023
27. 5 Simple Things You Can Do To Navigate Safe Online
(Guest Opinion)
... priority. From staying safe on social media to avoiding scams and phishing attacks, there are a lot of risks out there. But don't worry, there are a lot of simple things you can do to stay safe online, ...
Created on 11 January 2023
28. Constant Evolution is the Key to Protecting your Data from Threat Actors
(Guest Opinion)
... attacks. In a recent survey conducted by Elastic, just a third of IT leaders describe their security strategy as having a genuine mix of prevention and incident detection and response controls. But preventative ...
Created on 10 January 2023
29. Australia’s Digital Future will be Built on Secure and Ethical Use of Data
(Guest Opinion)
... report, the frequency and severity of cyberattacks are increasing. It is critical, therefore, that the collection, storage and use of data are subject to a thorough risk assessment. Rather than asking ...
Created on 10 January 2023
30. Tried and trusted ways to protect yourself from cyber crime
(Guest Opinion)
... safe online, this gives you an extra layer of security. This will bring you peace of mind that your money and your personal information is protected against any potential attacks. Ensure your passwords ...
Created on 08 January 2023
31. Average Cost of Data Breaches Expected to Surpass $5 Million Per Incident in 2023: Acronis
(Guest Research)
... the use of MFA (Multi-Factor Authentication) fatigue attacks, an extremely effective method used in high-profile breaches, are on the rise. Conducted by the Acronis Cyber Protection Operation Center, ...
Created on 29 December 2022
32. Tried and trusted ways to protect yourself from cyber crime
(Security)
... safe online, this gives you an extra layer of security. This will bring you peace of mind that your money and your personal information is protected against any potential attacks. Ensure your passwords ...
Created on 29 December 2022
33. Data Rooms & Storage Solutions - Securely Store Your Data
(Guest Opinion)
...  Weak security compared to dataroom software. Companies that have poor security are more vulnerable to identity data theft and other cyberattacks, which is bad for businesses. Without adequate security ...
Created on 23 December 2022
34. Prioritise Cyber Resilience and Cybersecurity Basics to Help Your Organisation Start 2023 Right
(Guest Opinion)
... companies, and public sector institutions, including education bodies, all suffering data breaches. In several of these attacks, more than 2 million customers’ personally identifiable information (PII), ...
Created on 22 December 2022
35. Five Tech Trends That Will Impact Australia in 2023
(Guest Opinion)
... energy goals and lower their overall carbon footprint. Cybersecurity This past year has illustrated the real and growing threat of sophisticated and opportunistic cyber-attacks on Australian organisations. ...
Created on 21 December 2022
36. Australian application teams are now reviewing whether their APIs overshare
(Guest Opinion)
... Gartner predicted last year that API attacks would become the most frequent attack vector in 2022, “causing data breaches for enterprise web applications.” On this, they were correct. A publicly exposed ...
Created on 21 December 2022
37. Increased cyber security requirements for systems connecting to My Health Record
(Health)
... attacks, uplift information security and provide better protection for consumer information. Each vendor with software products connected to My Health Record will be required to submit an extensive file ...
Created on 21 December 2022
38. Cost of doing nothing: Australian organisations are gambling on cybersecurity
(Guest Opinion)
... by the scale of cyber-attacks experienced in other countries – like the Colonial Pipeline for example, Australia has been living in a false sense of security when it comes to our cyber-readiness. The ...
Created on 21 December 2022
39. The cost of doing nothing: Australian organisations are gambling on cybersecurity
(Security)
... by the scale of cyber-attacks experienced in other countries – like the Colonial Pipeline for example, Australia has been living in a false sense of security when it comes to our cyber-readiness. The ...
Created on 21 December 2022
40. Holiday shopping threats to security
(Guest Research)
... compromised financial information or through compromised retail accounts where credit card information is stored. Access to these accounts is often done through phishing attacks, password-spraying attacks, ...
Created on 20 December 2022
41. The future is quantum – how organisations can prepare themselves
(Guest Opinion)
... be able to defend against such brute force attacks. Organisations will need to adopt other methods to ensure their data is safe. Migrating to quantum resistant algorithms will take years to integrate ...
Created on 20 December 2022
42. Nozomi: 2023 - A crucial year for cybersecurity developments in OT and ICS Industries
(Guest Opinion)
... to be a lucrative target for hackers Cyber threats will continue to rise. ICS are not immune from the severity of cyberattacks, demonstrated in 2022 with Incontroller. The attack was fortunately thwarted ...
Created on 20 December 2022
43. Kyndryl execs reveal what's in store in tech in 202
(Guest Opinion)
... taking out home loans.” “Just as high on my list is the continued focus on Cybersecurity and increasingly on Cyber-resilience, whereby businesses not only protect themselves against attacks but become ...
Created on 19 December 2022
44. Australian Businesses ‘Wasting Investment’ on Identity Management Security Solutions Amid Widespread Identity-Based Attacks: Survey
(Guest Research)
... tools they are not actively using GUEST RESEARCH: Australian companies are not doing enough to protect themselves from potential cyberattacks, and their misguided enterprise investment in scattered ...
Created on 19 December 2022
45. Ok boomer - Palo Alto Networks research finds Baby Boomers better at password reuse than Gen Z
(Security)
With a string of high-profile cyber attacks on Australian businesses in recent months, chances are high that it will happen again. Palo Alto Networks research found cyber security awareness still needs ...
Created on 19 December 2022
46. Gigamon third quarter 2022 cloud services revenue grows over 100% YoY, solidifying leadership in deep observability market
(Company News)
... these complex networks inadvertently create security and performance blind spots that can leave organisations exposed to security threats and attacks. Over 52 million cyber-attacks took place in the ...
Created on 19 December 2022
47. KPMG and Vectra AI join forces to ‘reduce cyber risk’ for hybrid cloud enterprises
(Company News)
... and eliminate noise. In just a matter of days, our clients are able to achieve greater visibility, detection efficacy, and cut incident response times – as proven by KPMG red teaming exercises.” As cyber-attacks ...
Created on 18 December 2022
48. Security program development in business
(Guest Opinion)
GUEST OPINION: Business leaders should be aware of the possible cyber threats that can harm their company’s IT infrastructure and take steps to protect it. Cyberattacks are vicious and cost a lot more ...
Created on 17 December 2022
49. F5 expands SaaS-based security portfolio with launch of F5 distributed cloud app infrastructure protection
(Company News)
... and increases the security threat surface, and as a result customers are forced to deploy inconsistent security controls and lack necessary visibility, particularly for cloud-native deployments. Attacks ...
Created on 16 December 2022
50. Rubrik appoints Thompson as lead independent board director
(People Moves)
... modern cyberattacks such as ransomware," said Thompson. "In order to win this war on data, Rubrik is redefining the cybersecurity industry with data security that gives organisations business resilience. ...
Created on 16 December 2022
  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next
  • End
  • Home
  • Latest News
  • Your IT
  • Business IT
  • IT Industry
  • NEWSLETTER
  • MAGAZINE
  • IT People
  • Government
  • RSS

Services

  • Promotional News & Content
  • Sponsored Announcements
  • Self Posting
  • JobZilla IT Jobs
  • See Newsletter
  • Our Journalists

Company

  • About
  • Contact
  • Advertising Specs
  • Advertise NOW
  • Privacy
  • Editorial Guidlines& Complaints Handling
  • Sitemap

Connect

Facebook
Twitter
Cloud Hosting by Digital Pacific