• Subscribe to Newsletter
  • Advertise
iTWire iTWire iTWire
  • Home
    • About iTWire
    • About iTWire - Advertising, Sponsored Posts, Editorial & Press Releases
    • About our News site
    • Advertise in Newsletter
    • Advertise on iTWire
    • Advertising Specs
    • Advertorials
    • Commswire Subscription
    • Contact CEO
    • Contact Editor
    • Current Webinars
    • Interviews
    • iTWire News Site Editor
    • Lead Generation
    • Newsletter Editor
    • Our Journalists
    • Press Releases
    • Promotional News
    • Reviews
    • See Latest Newsletter
    • Commswire Newsletter Example
    • Sponsored News
    • Webinar Promotion
    • Zoom Interviews
  • Your Tech
    • Browse News
      • Entertainment & Gaming
      • Mobility
      • Home Tech
      • Wi-Fi
      • Apps
      • Internet of Things
  • Business
    • Browse News
      • iTWire Marketing
      • Networking
      • Open Source
      • Security & Cybersecurity
      • Business Telecommunications
      • Enterprise Solutions
      • Print Solutions
      • Hardware
      • Storage & Cloud Storage
      • Business Software
      • Cloud
      • Data Analytics & Artificial Intelligence
      • Data Centres
      • MVNO
      • Managed Services
      • Accounting Software
      • Business Intelligence
  • Industry
    • Browse News
      • Deals
      • Channel News & Partnerships
      • Cloud Accounting
      • Enterprise Cloud
      • Virtualisation
      • Web Development & Front-End Development
      • Telecoms & NBN
      • Manufacturing & Logistics
      • Web Hosting
      • VoIP
      • Strategy
      • Listed Tech
      • Market
      • Application Performance
      • CRM & Contact Center Apps
  • People
    • Browse News
      • Career Coach
      • Recruitment
      • Not For Profit
      • Education & Machine Learning
      • People Moves
      • CIO Trends
      • Enterprise Staff
      • Remote Working
  • GOVT
    • BROWSE NEWS
      • Government Tech Policy
      • Technology Regulation
      • Technology Tenders
      • Local Government
  • Science
    • Browse News
      • Energy
      • Climate
      • Health
      • Biology
      • Automotive
      • Space
    • Water Resources
    • Environment
    • Mining here
  • Opinion
    • Browse
      • Apexing the Linux learning curve
      • ShrinkAge
      • The Big House
      • Fuzzy Logic - Alex Zaharov-Reutt
      • Seeking Nerdvana
      • Open Sauce - Sam Varghese
      • A Meaningful Look
      • Transit
      • Business Intelligence Blog
      • ShawThing
    • Browse
      • Stephen Withers
      • Whiskey Tango Foxtrot - David Heath
      • Linux Distillery - David M Williams
      • UNI-verse
      • Radioactive IT
      • Cornered!
      • Beerfiles
      • ICT Energy and Sustainability
      • Wired CIO - David M Williams
      • C Level
  • Reviews
    • Browse
      • Computers & Peripherals
      • Smartphones & Mobile Devices
      • Software
      • Networking
      • Books
      • Games
  • Guest Articles
    • Guest Opinion
    • Guest Reviews
    • Guest Interviews
    • Webinars & Online Events
    • Guest Research
    • Company News
  • CHANNELS
  • ITWIRE TV

Total: 301 results found.

Search for:
Search Only:
1. Why deep observability is key to closing cloud migration security gaps
(Guest Opinion)
... metadata that is used to validate the authenticity of the log-based observability insights. Our technology takes it to the next level by going into all seven layers of security to extract reliable metadata ...
Created on 30 January 2023
2. iOS 16.3 now supports security keys
(Security)
... giving the best cybersecurity defence against your credentials being stolen during a data breach or via a phishing attempt. “With 90% of breaches being tied to stolen credentials from phishing attacks, ...
Created on 27 January 2023
3. Data room: The unstoppable rise of real assets, visualized
(Guest Opinion)
... with just one technology, which will be described here today. Learn more about what a VDR is now We'll begin by defining an online data room in general terms. If you're already familiar with some of ...
Created on 27 January 2023
4. Denodo achieves AWS Data and Analytics ISV Competency status
(Company News)
COMPANY NEWS: Denodo, a leader in data management, today announced that it has achieved the Amazon Web Services (AWS) Data and Analytics ISV Competency status. Attaining this status differentiates ...
Created on 25 January 2023
5. The SonicWall NSsp 15700 brings serious network protection super powers
(Networking)
The network is more important than ever. Public cloud, hybrid cloud, remote working, B2B, EDI, APIs, mandatory data breaching, GDPR, malware … at any moment of any day your business is transacting data ...
Created on 23 January 2023
6. BeyondTrust enhances Linux and Active Directory support
(Security)
... to Active Directory in a hybrid mode. In addition, the new versions include Elasticsearch SIEM integration so that log data from Privilege Management for Unix and Linux and Active Directory Bridge can ...
Created on 20 January 2023
7. How to secure your customers’ personally identifiable information against compromise
(Security)
The challenge of securing customer information has never been more apparent. Organisations are failing to appropriately protect their customers’ data, leading to financial loss, reputational loss, and ...
Created on 19 January 2023
8. Why Zero Trust is the Best Security Strategy for 2023
(Guest Opinion)
... with legacy security measures and add additional tools as required. Taking this approach, however, can be a costly mistake. This is because an increasing proportion of data breaches are caused by phishing ...
Created on 18 January 2023
9. Digital Trust now critical for maintaining customer loyalty
(Guest Opinion)
... with the digital world without worrying about your data or information being compromised. DigiCert’s State of Digital Trust Survey for 2022 shows customers are ready to change their loyalties if trust ...
Created on 18 January 2023
10. Jamf ends 2022 helping approximately 71,000 customers succeed with Apple
(Company News)
... analytics with comprehensive logging for both endpoint and network security events, for better detection and remediation • Removable storage controls to ensure sensitive business data is only written to ...
Created on 18 January 2023
11. Absolute ‘deepens commitment’ to public sector, achieves FedRAMP Ready Designation
(Security)
... - and despite this massive and continuously increasing security investment, Absolute data has shown that up to 25 per cent of devices have unhealthy security controls that have been tampered with, uninstalled, ...
Created on 16 January 2023
12. Radware launches new cloud security centres in Australia and New Zealand
(Company News)
... attacks on APIs. It will also help them increase resiliency and comply with offshore data routing requirements. In addition to Australia, New Zealand and Canada, the company recently launched security ...
Created on 16 January 2023
13. How to cyber secure your own apartment
(Guest Opinion)
... the fine print before signing up for any digital accounts or devices. While this might sound tedious, it could save you a lot of heartache in the future. Who are they sharing your data with and is there ...
Created on 12 January 2023
14. How to cyber secure your apartment
(Security)
... the fine print before signing up for any digital accounts or devices. While this might sound tedious, it could save you a lot of heartache in the future. Who are they sharing your data with and is there ...
Created on 12 January 2023
15. Synology releases small footprint two-bay DiskStation DS723+
(Storage & Cloud Storage)
... and offers great control over your NAS to make it work exactly how you want. The DS723+ is no simple storage device; with Synology's DSM you gain comprehensive options to protect and manage business data, ...
Created on 11 January 2023
16. 5 Simple Things You Can Do To Navigate Safe Online
(Guest Opinion)
GUEST OPINION: In today's world, knowing how to navigate safely online is more important than ever. We spend most of our time surfing the web, and taking the necessary measures to protect our data is a ...
Created on 11 January 2023
17. Constant Evolution is the Key to Protecting your Data from Threat Actors
(Guest Opinion)
... 2017, the company wrote off more than $100M in a quarter and had to postpone major acquisition. And data from the USA’s Security and Exchange Commission has found that 60% of Small to Medium Enterprises ...
Created on 10 January 2023
18. Tried and trusted ways to protect yourself from cyber crime
(Guest Opinion)
... use so that you don't need to be a tech genius in order to keep ourselves and our data safe on the internet. These kinds of services can help you set up everything you need in order to be protected against ...
Created on 08 January 2023
19. 5 Tech innovations to enhance physical security operations
(Guest Opinion)
... available. Some key ones include security information and event management (SIEM) and security analytics software.  SIEM software collects and analyses data from various security systems and alerts you ...
Created on 03 January 2023
20. Sensibo Elements can help you breathe better and live better
(Smartphones & Mobile devices)
... gives more detail on specific items, as well as graphs that go back 12 hours. Further historic detail is not available so you can’t use the data to plot trends over time unless you record it manually, ...
Created on 02 January 2023
21. Average Cost of Data Breaches Expected to Surpass $5 Million Per Incident in 2023: Acronis
(Guest Research)
GUEST RESEARCH: The average cost of data breaches is expected to surpass US$5 million per incident in 2023, new research from the Acronis Cyber Protection Center threat report reveals. Phishing and ...
Created on 29 December 2022
22. We’ve blocked over 225 million scam text messages since April
(Telecoms & NBN)
... financial data. Each one of these 225 million scams blocked reduces the chance of Australians falling victim to one of these. It’s also a reminder that scammers are persistent and target just about ...
Created on 29 December 2022
23. Tried and trusted ways to protect yourself from cyber crime
(Security)
... use so that you don't need to be a tech genius in order to keep ourselves and our data safe on the internet. These kinds of services can help you set up everything you need in order to be protected against ...
Created on 29 December 2022
24. Data Rooms & Storage Solutions - Securely Store Your Data
(Guest Opinion)
GUEST OPINION: Does the virtual data room really provide advanced security for files that belong to corporations? Surprisingly, the answer will encourage you to reconsider this tool. Before discussing ...
Created on 23 December 2022
25. Five Tech Trends That Will Impact Australia in 2023
(Guest Opinion)
... to adapt to changing conditions quickly and cost-effectively, we anticipate more businesses will tap into a global ecosystem of partners sharing services, applications, and data. Sustainability Sustainability ...
Created on 21 December 2022
26. Predictions: What 2023 Has in Store for Aussie Businesses
(Guest Opinion)
... artificial intelligence (AI). AI tools can be put to work analysing large volumes of data and provide businesses with valuable insights that might otherwise have been missed. During 2023, cloud platforms ...
Created on 21 December 2022
27. Australian application teams are now reviewing whether their APIs overshare
(Guest Opinion)
... Gartner predicted last year that API attacks would become the most frequent attack vector in 2022, “causing data breaches for enterprise web applications.” On this, they were correct. A publicly exposed ...
Created on 21 December 2022
28. Cost of doing nothing: Australian organisations are gambling on cybersecurity
(Guest Opinion)
... recent high-profile data breaches against Optus and Medibank and dozens more have woken corporate Australia up to the realities of the evolving cyber landscape. Attacks are increasing in scale and severity, ...
Created on 21 December 2022
29. The cost of doing nothing: Australian organisations are gambling on cybersecurity
(Security)
... recent high-profile data breaches against Optus and Medibank and dozens more have woken corporate Australia up to the realities of the evolving cyber landscape. Attacks are increasing in scale and severity, ...
Created on 21 December 2022
30. Nozomi: 2023 - A crucial year for cybersecurity developments in OT and ICS Industries
(Guest Opinion)
... to pay out a ransom, but the financial loss from downtime, or the reputational impacts from a data breach, can be just as damaging as the financial payout. Predicting the future of the operational technology ...
Created on 20 December 2022
31. Gigamon third quarter 2022 cloud services revenue grows over 100% YoY, solidifying leadership in deep observability market
(Company News)
... total revenue. The company has also seen a 94% YoY increase in cumulative cloud data volume under management, which now sits at over 2 million terabytes per day, which demonstrates the company's ability ...
Created on 19 December 2022
32. Zimperium discovers novel predatory loan malware hiding in mobile apps developed with Flutter
(Company News)
... uploads victims’ critical and personal data to its server, including installed apps, GPS locations, SMS, contact information, device information, metadata of images, and more. This stolen information ...
Created on 19 December 2022
33. F5 expands SaaS-based security portfolio with launch of F5 distributed cloud app infrastructure protection
(Company News)
... run cryptominers, or access sensitive data. F5 Distributed Cloud App Infrastructure Protection addresses these challenges through: 1. A combination of rules and machine learning to detect threats in ...
Created on 16 December 2022
34. Pure Storage’s technical leadership team in Asia Pacific & Japan share their predictions for 2023
(Company News)
COMPANY NEWS: The technical leadership team in Asia Pacific & Japan (APJ) from Pure Storage, the IT pioneer that delivers the world's most advanced data storage technology and services, today shared their ...
Created on 15 December 2022
35. iSignthis refused Consumer Data Right accreditation by ACCC
(Technology Regulation)
FinTech company iSignthis Australia has been refused Consumer Data Right (CDR) accreditation by the consumer watchdog, the Australian Competition and Consumer Commission (ACCC) In making its decision ...
Created on 15 December 2022
36. Want to be secure and reduce your carbon footprint? Cloudflare WAF brings both
(Security)
... applications from hackers and buys you time in patching and remediating flaws. One of the largest US data breaches of all time, Equifax, came via an unpatched Adobe Struts installation and would have been ...
Created on 15 December 2022
37. : Abusing JSON-based SQL to bypass WAF
(Guest Research)
... in securing organizational information stored in a database that can be reached through a web application. WAFs are also increasingly used to protect cloud-based management platforms that oversee connected ...
Created on 15 December 2022
38. Australian application teams are now reviewing whether their APIs overshare
(Guest Opinion)
... last year that API attacks would become the most frequent attack vector in 2022, “causing data breaches for enterprise web applications.” On this, they were correct. A publicly exposed API is widely ...
Created on 14 December 2022
39. Proofpoint signs Definitive Agreement to Acquire Illusive
(Deals)
... threats like ransomware​ and data breaches”. According to Proofpoint the global increase in cyberattacks has been enabled by attackers shifting their tactics and focus to identity-based attacks, with ...
Created on 13 December 2022
40. Australia now leads the world in data breaches following Medibank breach
(Security)
Australia now has the highest data breach density in the world, with breaches spiking by 489% this quarter (and it's not over yet). Globally, data breaches have decreased by 70.8% while Australian breaches ...
Created on 13 December 2022
41. Digital identity takes off as governments realise benefits, says GlobalData
(Strategy)
... identity, enabling the technology to take off, according to data and analytics company GlobalData. GlobalData’s latest report, ’Digital Identity’, reveals that the theme had previously been slow to ...
Created on 13 December 2022
42. Vectra AI Extends Support for Amazon Security Lake
(Company News)
... platform to Amazon Security Lake. Consolidating data store to allow security teams standardized access to real threat data. Amazon Security Lake automatically centralizes an organization’s security ...
Created on 12 December 2022
43. WA integrator CMTG selects Fortinet for new managed threat management service
(Deals)
... control, and performance of its clients' IT infrastructure for over 15 years. This includes a data centre in Perth, secure dark fibre connectivity, infrastructure solutions, service, and consulting, all ...
Created on 12 December 2022
44. Ten Key Security Trends to Watch in 2023
(Guest Opinion)
... focus on having full-system recovery capabilities that provide operability of their entire IT infrastructure and not just their data. 10. Credential theft remains a top target for attackers. These ...
Created on 12 December 2022
45. 10 ways to stay cyber secure during the coming holiday season
(Guest Opinion)
... are immune from threats and attacks. There are 10 key steps that can be taken to ensure critical IT equipment and data remains secure during the holiday season. They are: 1. Create a personal data ...
Created on 12 December 2022
46. Monash, OCSC to deliver regional post-quantum crypto training
(Security)
... of Monash University's Faculty of Information Technology, encryption is one of the key safeguards against data breaches. "However, most currently deployed cryptography is not strong enough against attacks ...
Created on 12 December 2022
47. 'Innovative' bushfire intelligence technology lands in Australia: Pano A
(Market)
... that imagery with satellite and other data feeds, which is all analysed by AI algorithm- and when Pano AI detects a fire threat, its 24/7 intelligence centre confirms the fire and sends an alert within ...
Created on 09 December 2022
48. Understanding the working of a UPS
(Guest Opinion)
... The technology that allows each UPS system to function differently makes them distinct and allows them to backups up expensive data. In addition, different methods can be used to store energy. The most ...
Created on 08 December 2022
49. Dynabook’s Satellite Pro C40 and C50 gets a feature refresh
(Your Tech)
... display, and data transfer, as well as and Gigabit LAN and 802.11ax Wi-Fi 6e for network access. The Satellite Pro C40 and C50-K series come with enterprise security features such as firmware-based Trusted ...
Created on 08 December 2022
50. Lookout security prediction for 2023
(Guest Opinion)
GUEST OPINION: Lookout executives Aaron Cockerill and Sundaram Lakshmanan have identified six security prediction trends to look out for in 2023. 1) Data breaches will only prove more complicated – ...
Created on 08 December 2022
  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next
  • End
  • Home
  • Latest News
  • Your IT
  • Business IT
  • IT Industry
  • NEWSLETTER
  • MAGAZINE
  • IT People
  • Government
  • RSS

Services

  • Promotional News & Content
  • Sponsored Announcements
  • Self Posting
  • JobZilla IT Jobs
  • See Newsletter
  • Our Journalists

Company

  • About
  • Contact
  • Advertising Specs
  • Advertise NOW
  • Privacy
  • Editorial Guidlines& Complaints Handling
  • Sitemap

Connect

Facebook
Twitter
Cloud Hosting by Digital Pacific