• Subscribe to Newsletter
  • Advertise
iTWire iTWire iTWire
  • Home
    • About iTWire
    • About iTWire - Advertising, Sponsored Posts, Editorial & Press Releases
    • About our News site
    • Advertise in Newsletter
    • Advertise on iTWire
    • Advertising Specs
    • Advertorials
    • Commswire Subscription
    • Contact CEO
    • Contact Editor
    • Current Webinars
    • Interviews
    • iTWire News Site Editor
    • Lead Generation
    • Newsletter Editor
    • Our Journalists
    • Press Releases
    • Promotional News
    • Reviews
    • See Latest Newsletter
    • Commswire Newsletter Example
    • Sponsored News
    • Webinar Promotion
    • Zoom Interviews
  • Your Tech
    • Browse News
      • Mobility
      • Home Tech
      • Wi-Fi
      • Apps
      • Internet of Things
    • Entertainment & Gaming
  • Business
    • Browse News
      • iTWire Marketing
      • Networking
      • Open Source
      • Security & Cybersecurity
      • Business Telecommunications
      • Enterprise Solutions
      • Print Solutions
      • Hardware
      • Storage & Cloud Storage
      • Business Software
      • Cloud
      • Data Analytics & Artificial Intelligence
      • Data Centres
      • MVNO
      • Managed Services
      • Accounting Software
      • Business Intelligence
  • Industry
    • Browse News
      • Deals
      • Channel News & Partnerships
      • Cloud Accounting
      • Enterprise Cloud
      • Virtualisation
      • Web Development & Front-End Development
      • Telecoms & NBN
      • Manufacturing & Logistics
      • Web Hosting
      • VoIP
      • Strategy
      • Listed Tech
      • Market
      • Application Performance
      • CRM & Contact Center Apps
  • People
    • Browse News
      • Career Coach
      • Recruitment
      • Not For Profit
      • Education & Machine Learning
      • People Moves
      • CIO Trends
      • Enterprise Staff
      • Remote Working
  • GOVT
    • BROWSE NEWS
      • Government Tech Policy
      • Technology Regulation
      • Technology Tenders
      • Local Government
  • Science
    • Browse News
      • Energy
      • Climate
      • Health
      • Biology
      • Automotive
      • Space
    • Water Resources
    • Environment
    • Mining here
  • Opinion
    • Browse
      • Apexing the Linux learning curve
      • ShrinkAge
      • The Big House
      • Fuzzy Logic - Alex Zaharov-Reutt
      • Seeking Nerdvana
      • Open Sauce - Sam Varghese
      • A Meaningful Look
      • Transit
      • Business Intelligence Blog
      • ShawThing
    • Browse
      • Stephen Withers
      • Whiskey Tango Foxtrot - David Heath
      • Linux Distillery - David M Williams
      • UNI-verse
      • Radioactive IT
      • Cornered!
      • Beerfiles
      • ICT Energy and Sustainability
      • Wired CIO - David M Williams
      • C Level
  • Reviews
    • Browse
      • Computers & Peripherals
      • Smartphones & Mobile Devices
      • Software
      • Networking
      • Books
      • Games
  • Guest Articles
    • Guest Opinion
    • Guest Reviews
    • Guest Interviews
    • Webinars & Online Events
    • Guest Research
    • Company News
  • CHANNELS
  • ITWIRE TV

Total: 300 results found.

Search for:
Search Only:
1. How to secure your customers’ personally identifiable information against compromise
(Security)
The challenge of securing customer information has never been more apparent. Organisations are failing to appropriately protect their customers’ data, leading to financial loss, reputational loss, and ...
Created on 19 January 2023
2. Digital Trust now critical for maintaining customer loyalty
(Guest Opinion)
... with the digital world without worrying about your data or information being compromised. DigiCert’s State of Digital Trust Survey for 2022 shows customers are ready to change their loyalties if trust ...
Created on 18 January 2023
3. Jamf ends 2022 helping approximately 71,000 customers succeed with Apple
(Company News)
... analytics with comprehensive logging for both endpoint and network security events, for better detection and remediation • Removable storage controls to ensure sensitive business data is only written to ...
Created on 18 January 2023
4. What MSPs need to know about work migrations
(Guest Opinion)
... there are throttling realities of which they should be aware. What throttling changes can they expect? Microsoft and Google continue to throttle to limit the amount of data migrated during peak times ...
Created on 22 December 2022
5. Security program development in business
(Guest Opinion)
... security strategy and governance an organization uses to protect its data and internal components. Development of a Security Program For a company to develop a robust information security program, ...
Created on 17 December 2022
6. Lookout security prediction for 2023
(Guest Opinion)
GUEST OPINION: Lookout executives Aaron Cockerill and Sundaram Lakshmanan have identified six security prediction trends to look out for in 2023. 1) Data breaches will only prove more complicated – ...
Created on 08 December 2022
7. How the move to an online society shines the spotlight on fraud
(Guest Opinion)
... Data suggesting that purchasing of clothing and footwear items may fall by up to 20.6%, retailers must protect against fraud losses without alienating the new eCommerce customers that are crucial to future ...
Created on 28 November 2022
8. Balancing productivity with a strong cyber strategy
(Guest Opinion)
... whether it’s for data loss prevention or web security. If you can convince the necessary stakeholders and reorganise your budget, you can see tremendous benefits to implementing cloud security. Streamlining ...
Created on 23 November 2022
9. How to protect popular query language GraphQL APIs from exploits
(Guest Opinion)
... existing data. A recent Gartner report shared that by 2025, more than 50% of enterprises will use GraphQL in production, up from less than 10% in 2021. Originally developed by Facebook, GraphQL is ...
Created on 16 November 2022
10. Navigating the Security Sector’s ‘Alphabet Soup’ of Terminology
(Guest Opinion)
... segmentation, system integrity protection, and host-based intrusion prevention and detection. Although they provide security at a workload level, CWPPs do not offer coverage at the data or application ...
Created on 15 November 2022
11. Scams Awareness Week 2022 'empowers Australians' to spot a scam: Scamwatc
(Security)
... more vulnerable to scams following the recent spate of large-scale data breaches, there has never been a more important time to know the tell-tale signs of a scammer,” ACCC Deputy Chair Delia Rickard warns. ...
Created on 07 November 2022
12. Lookout Partners with HPE Aruba To Deliver An Integrated SASE Architecture With Advanced Data Protection
(Company News)
Lookout security service edge (SSE) with Aruba EdgeConnect Enterprise SD-WAN helps customers achieve a modern SASE architecture that safeguards data across devices, apps, networks and clouds COMPANY ...
Created on 01 November 2022
13. What this historic cybersecurity awareness month meant for business
(Security)
... also “what are you going to do about it when you are?” As many a company today will attest, the cost of a data breach is huge, resulting in financial loss, business disruption, and damage to reputation, ...
Created on 01 November 2022
14. What this historic cybersecurity awareness month has meant for business
(Guest Opinion)
... also “what are you going to do about it when you are?” As many a company today will attest, the cost of a data breach is huge, resulting in financial loss, business disruption, and damage to reputation, ...
Created on 31 October 2022
15. How to prevent fraud with identity verification?
(Guest Opinion)
... keep their data safe and put an end to fraud. That’s because fraudsters and online criminals are evolving. Thankfully, along with the endless list of fraud risks, we now have technological solutions ...
Created on 24 October 2022
16. Digital payments and BNPL scheme contribute to e-commerce fraud losses: Juniper Research
(Market)
... globally. The research cited the vast volume of data breaches and the broad availability of stolen credit card information as the key risk factors in this market. “To combat this fraud, e-commerce ...
Created on 14 October 2022
17. Asana update has enterprises in mind
(Enterprise Solutions)
... with Nightfall data loss prevention, a forthcoming eDiscovery integration with Hanzo, and additional mobile app administration controls to ensure data security and enable biometric authentication. Asana ...
Created on 13 October 2022
18. netQ appointed as Cato Networks strategic partner in rapidly growing secure access service edge market
(Deals)
... security postures in the next several years to address the ever-growing threats to their IT infrastructure and critical data assets,” said Cato Networks ANZ channel leader Michael Fullbrook. “To be successful ...
Created on 11 October 2022
19. Let's clear the cloud visibility haze with app awarenes
(Guest Opinion)
... data, it's difficult for IT teams and tools to focus on the most actionable activity and avoid wasting resources processing irrelevant traffic. Often we inundate security, observability, compliance and ...
Created on 22 August 2022
20. Consumers suffer millions in losses as imposter bond investment scams rise, warns ACCC
(Security)
... sites. The latest Scamwatch data reveals there were 228 reports of imposter bond scams between January and June, compared with 82 reports in the first half of last year. The ACCC reports that losses ...
Created on 03 August 2022
21. Businesses hit by rising e-commerce fraud: report
(Security)
... and more than half curtailing expansion plans due to fraud concerns, according to a new report from financial services and software as a service company Stripe. Stripe reports that by combining data ...
Created on 22 July 2022
22. Zscaler advances cybersecurity and user experience with new AI/ML capabilities for the Zscaler Zero Trust Exchange
(Company News)
... billion data transactions daily and blocks 150 million daily attacks across the globe to dramatically expedite investigation, response and resolution times, and pinpoint potential malware to stop breaches ...
Created on 23 June 2022
23. Zscaler ThreatLabz 2022 Ransomware Report reveals record number of attacks and nearly 120% growth in double extortion ransomware
(Guest Research)
... a year's worth of data from the largest security cloud in the world, which processes more than 200 billion daily transactions and 150 million daily blocked attacks across the Zscaler Zero Trust Exchange. ...
Created on 06 June 2022
24. Sydney Water saves 9,000 megalitres of water using acoustic sensors
(Government Tech)
...  Logger locations and leak alarms are visible in a web portal developed by UTS which consolidates all acoustic sensor data from various sensor manufacturers. Changes in the water network are monitored ...
Created on 30 May 2022
25. Dell revamps Iress' management process
(Strategy)
... was putting the company’s valuable data at risk. Despite regular checks, the team was becoming less confident that they were remaining compliant and secure. They also wanted a solution with zero-touch ...
Created on 24 May 2022
26. Ivanti, Lookout partner to extend Ivanti Neurons for zero trust access to end-to-end security services edge solution
(Security)
... prevention and data security both on-premises and in the cloud, inside and outside the network, while following zero trust access security principles.  The pandemic has catalysed a monumental shift in ...
Created on 12 May 2022
27. Australia has 4th highest cybercrime rate worldwide: Surfshark study
(Security)
... with online threats”,explains Agneska Sablovskaja, Data Researcher at Surfshark. Two new European countries came in the top of this year's cybercrime ranking, one of them being Greece (5th). Meanwhile, ...
Created on 09 May 2022
28. Jamf boosts security capabilities
(Security)
... Comprehensive logging for both endpoint and network security events helps InfoSec teams isolate and remediate detected threats, and investigate incidents using data collected on the device and from the ...
Created on 02 May 2022
29. Digital economy has Aussies caught in a personal 'data trap': Imperv
(Security)
Aussies feel trapped by the digital economy with a new online survey finding that the majority of consumers feel they have to share personal data if they want to use digital services - but they don’t trust ...
Created on 26 April 2022
30. Part 2: More tech executive commentary on Australia's 2022-23 Federal Budge
(Government Tech)
...  cyber monitoring, detection and response capability across government". If Australia is to achieve its ambition of being in the top ten of data and digital economies globally by 2030 this requires movin ...
Created on 30 March 2022
31. How to prevent ransomware devastation
(Security)
... attacks to more calculated, advanced persistent threat (APT)-style attacks. This attack style allows cyber criminals to exfiltrate sensitive data prior to encrypting affected hosts, opening the doors ...
Created on 27 March 2022
32. Barracuda research uncovers new insights into the ways cybercriminals are targeting businesses with spear-phishing attacks
(Security)
... and buying gift cards.                                                                                    Maximise data-loss prevention. use the right combination of technologies and business policies ...
Created on 21 March 2022
33. Barracuda research uncovers new insights into the ways cybercriminals are targeting businesses with spear-phishing attacks
(Company News)
... buying gift cards.                                                                                    Maximise data-loss prevention. use the right combination of technologies and business policies to ...
Created on 21 March 2022
34. HelpSystems launches new global channel program
(Company News)
...  More than 30,000 customers around the globe rely on HelpSystems’ leading solutions, including data classification, data loss prevention, secure file transfer and email security products from Agari, ...
Created on 15 March 2022
35. Nexion launches SmartRooms initiative, online store
(Market)
... data loss, and damages organisations face are due to environmental factors. “Every organisation monitors their network for security to prevent outages, but how many are monitoring their mission critical ...
Created on 14 March 2022
36. Warning: Pay heed to Data Protection Day
(Guest Opinion)
GUEST OPINION: Data Protection Day, impending in Europe, serves as a global reminder of one of the most important responsibilities for any organisation: keeping sensitive data secure. My own company ...
Created on 25 January 2022
37. Dtex Systems' Koo named SA Pearcey Entrepreneur of the Year
(IT People)
... cybersecurity arena, relied upon to protect the workforce, data and systems of the world's most critical infrastructure entities, businesses and government agencies. He has built a truly international security ...
Created on 18 November 2021
38. Inspirational, world-improving inventions named global winners of the James Dyson Award 2021
(Home Tech)
... to continuously and accurately compute users’ IOP. Data is transmitted via Bluetooth to paired devices or uploaded to the Cloud to be accessed remotely by clinicians. The App prompts users with easy-to-read ...
Created on 17 November 2021
39. Jamf kicks off the 2021 Jamf Nation user conference, unveiling new ways to deliver an enterprise-secure, consumer-simple Apple Experience at work
(Enterprise Solutions)
... threat detection and zero-day phishing prevention with a web-based dashboard for real-time notifications and remediation. • Data loss prevention – Since the rollout of Jamf Protect, Jamf has implemented ...
Created on 20 October 2021
40. ManageEngine enhances endpoint security with new unified endpoint management capabilities
(Security)
ManageEngine, the enterprise IT management division of Zoho Corporation, has announced the addition of data loss prevention for endpoints, anti-ransomware, and endpoint compliance capabilities to its unified ...
Created on 19 October 2021
41. Forcepoint to acquire Bitglass
(Deals)
... network access (ZTNA), and cloud security posture management (CSPM) and data loss prevention (DLP) technologies being added to Forcepoint’s secure access service edge (SASE) platform. “Complexity is ...
Created on 12 October 2021
42. 4 essentials for overcoming data protection challenges in the New Normal
(Guest Articles)
Company News: Data is as valuable as currency today, and every business needs to protect it. Hardware and software failures, data corruption, ransomware attacks, or simple accidental deletion can result ...
Created on 23 September 2021
43. Hold the door: How to examine how to examine exfiltration activity and apply countermeasures
(Guest Opinion)
GUEST OPINION by Joe Slowik, Gigamon Principal Security Engineer, Applied Threat Research: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed ...
Created on 23 August 2021
44. Cost of Fraud in Asia-Pacific Markets is High According to LexisNexis Risk Solutions Study
(Guest Research)
... way to fight fraud across various channels and transaction types, as well as performing a more complete assessment that combines physical and digital identity data analysis. Using different solutions to ...
Created on 07 July 2021
45. Confluence in the time of cloud
(Cloud)
... cybersecurity solutions to protect data wherever it resides, in transit or at rest. "Cyber-attacks continue to increase in volume and ferocity, prompting organisations to seek ways to not only improve ...
Created on 04 July 2021
46. Ping Identity announces the acquisition of SecuredTouch to accelerate identity fraud capabilities
(Security)
... experience for their customers. As SecuredTouch is integrated with the broader PingOne Cloud Platform, enterprise customers will have access to advanced signals, data, and intelligence to gain a greater ...
Created on 25 June 2021
47. Six key characteristics of a modern ZTNA solution
(Guest Opinion)
... a ZTNA solution that has the highest verified uptime possible to ensure that their data is always secure. A dynamically scalable solution, such as one hosted in the public cloud, provides additional ...
Created on 15 June 2021
48. Proofpoint launches Information Protection and Cloud Security Solution and innovates its platforms
(Business IT)
Proofpoint unveils innovations across its platforms to protect organisations from advanced threats, data loss, and risks. Its Threat Protection Platform features BEC defence, which prevents potential financial ...
Created on 10 June 2021
49. Five key security trends affecting businesses in a post-COVID world
(Guest Opinion)
... unprepared when it comes to securing off-premises users. The biggest concerns stem from data leaking through endpoints (68%), users connecting with unmanaged devices (59%), and access from outside the ...
Created on 18 May 2021
50. Zscaler identifies industries worst hit by double-extortion ransomware
(Security)
Zscaler's latest ransomware report says manufacturing is the industry most targeted by double-extortion ransomware. Double-extortion ransomware exfiltrates data as well as encrypting it. The idea is ...
Created on 17 May 2021
  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
  • End
  • Home
  • Latest News
  • Your IT
  • Business IT
  • IT Industry
  • NEWSLETTER
  • MAGAZINE
  • IT People
  • Government
  • RSS

Services

  • Promotional News & Content
  • Sponsored Announcements
  • Self Posting
  • JobZilla IT Jobs
  • See Newsletter
  • Our Journalists

Company

  • About
  • Contact
  • Advertising Specs
  • Advertise NOW
  • Privacy
  • Editorial Guidlines& Complaints Handling
  • Sitemap

Connect

Facebook
Twitter
Cloud Hosting by Digital Pacific