• Subscribe to Newsletter
  • Advertise
iTWire iTWire iTWire
  • Home
    • About iTWire
    • About iTWire - Advertising, Sponsored Posts, Editorial & Press Releases
    • About our News site
    • Advertise in Newsletter
    • Advertise on iTWire
    • Advertising Specs
    • Advertorials
    • Commswire Subscription
    • Contact CEO
    • Contact Editor
    • Current Webinars
    • Interviews
    • iTWire News Site Editor
    • Lead Generation
    • Newsletter Editor
    • Our Journalists
    • Press Releases
    • Promotional News
    • Reviews
    • See Latest Newsletter
    • Commswire Newsletter Example
    • Sponsored News
    • Webinar Promotion
    • Zoom Interviews
  • Your Tech
    • Browse News
      • Mobility
      • Home Tech
      • Wi-Fi
      • Apps
      • Internet of Things
    • Entertainment & Gaming
  • Business
    • Browse News
      • iTWire Marketing
      • Networking
      • Open Source
      • Security & Cybersecurity
      • Business Telecommunications
      • Enterprise Solutions
      • Print Solutions
      • Hardware
      • Storage & Cloud Storage
      • Business Software
      • Cloud
      • Data Analytics & Artificial Intelligence
      • Data Centres
      • MVNO
      • Managed Services
      • Accounting Software
      • Business Intelligence
  • Industry
    • Browse News
      • Deals
      • Channel News & Partnerships
      • Cloud Accounting
      • Enterprise Cloud
      • Virtualisation
      • Web Development & Front-End Development
      • Telecoms & NBN
      • Manufacturing & Logistics
      • Web Hosting
      • VoIP
      • Strategy
      • Listed Tech
      • Market
      • Application Performance
      • CRM & Contact Center Apps
  • People
    • Browse News
      • Career Coach
      • Recruitment
      • Not For Profit
      • Education & Machine Learning
      • People Moves
      • CIO Trends
      • Enterprise Staff
      • Remote Working
  • GOVT
    • BROWSE NEWS
      • Government Tech Policy
      • Technology Regulation
      • Technology Tenders
      • Local Government
  • Science
    • Browse News
      • Energy
      • Climate
      • Health
      • Biology
      • Automotive
      • Space
    • Water Resources
    • Environment
    • Mining here
  • Opinion
    • Browse
      • Apexing the Linux learning curve
      • ShrinkAge
      • The Big House
      • Fuzzy Logic - Alex Zaharov-Reutt
      • Seeking Nerdvana
      • Open Sauce - Sam Varghese
      • A Meaningful Look
      • Transit
      • Business Intelligence Blog
      • ShawThing
    • Browse
      • Stephen Withers
      • Whiskey Tango Foxtrot - David Heath
      • Linux Distillery - David M Williams
      • UNI-verse
      • Radioactive IT
      • Cornered!
      • Beerfiles
      • ICT Energy and Sustainability
      • Wired CIO - David M Williams
      • C Level
  • Reviews
    • Browse
      • Computers & Peripherals
      • Smartphones & Mobile Devices
      • Software
      • Networking
      • Books
      • Games
  • Guest Articles
    • Guest Opinion
    • Guest Reviews
    • Guest Interviews
    • Webinars & Online Events
    • Guest Research
    • Company News
  • CHANNELS
  • ITWIRE TV

Total: 318 results found.

Search for:
Search Only:
1. What is an attack surface and how to reduce it
(Guest Opinion)
... to the fact that digital attack surfaces are dynamic, often in a constant state of flux depending on the composition of a network or system. What and how many devices are digitally connected, which cloud ...
Created on 03 February 2023
2. INTERVIEW: Building cyber mental resilience with Cybermindz' Peter Coroneos and NSW Minister for Digital, Victor Dominello
(Guest Interviews)
... the opportunity to share your thoughts on the value and the need for protecting the mental health of cybersecurity teams that are busy trying to protect our networks, what you think the role of organisations ...
Created on 03 February 2023
3. Gigamon hires Mazal as CSO, promotes Sagar to chief of staff
(People Moves)
...  Before joining Gigamon in 2020, she spent 12 years with Juniper Networks, most recently as senior director of engineering operations and program management. Earlier in her career she worked as a senior ...
Created on 03 February 2023
4. VIDEO: Building cyber mental resilience with Cybermindz' Peter Coroneos and NSW Minister for Digital, Victor Dominello
(Security)
... the opportunity to share your thoughts on the value and the need for protecting the mental health of cybersecurity teams that are busy trying to protect our networks, what you think the role of organisations ...
Created on 03 February 2023
5. Boomi Named a Leader for Ninth Consecutive Time in Gartner Magic Quadrant for Integration Platform as a Service, Worldwide
(Company News)
... network management, and data catalogue and preparation. Boomi recently announced significant updates to its platform and business, including: Product Innovation Rapid API Creation – Single-click ...
Created on 02 February 2023
6. Lifting the Veil on Exposure Management
(Guest Opinion)
... network. To be an effective part of any exposure management program, a platform needs to offer three key features: Comprehensive Visibility: A unified view of all assets and associated vulnerabilities ...
Created on 02 February 2023
7. BAI executes on hypergrowth strategy says telco boss
(Guest Interviews)
... on leveraging our local industry expertise and the solutions BAI is delivering globally across network infrastructure, private and public wireless, and smart precincts to help improve Australia’s communications ...
Created on 02 February 2023
8. BAI executes on hypergrowth strategy says telecommunications boss
(Business Telecommunications)
... on leveraging our local industry expertise and the solutions BAI is delivering globally across network infrastructure, private and public wireless, and smart precincts to help improve Australia’s communications ...
Created on 02 February 2023
9. Four cyber resilience best practices to consider In 2023
(Guest Opinion)
... of the network, endpoint, application, and password security. Here are four data security and data management best practices to consider implementing to build or enhance your cyber resilience: 1. Review ...
Created on 02 February 2023
10. Potentially 'more security vulnerabilities' with expanding Internet connections: stud
(Security)
... quickest to the organisation’s network. McKinnel says that to be an effective part of any exposure management program, a platform needs to offer three key features: Comprehensive Visibility: A unified ...
Created on 02 February 2023
11. Liberty Latin America selects Ribbon Analytics for in-depth network monitoring and fraud prevention
(Company News)
... technology and IP optical networking solutions to many of the world’s largest service providers, enterprises, and critical infrastructure operators to modernize and protect their networks, today announced ...
Created on 02 February 2023
12. BT and Stratospheric Platforms expand mobile coverage in new trial
(Business Telecoms)
... user groups and different potential use cases, concurrently on the same network. The HAPS solution is expected to provide significant cost and energy savings. The phased array antenna and the flight ...
Created on 01 February 2023
13. BeyondTrust updates and bundles Privileged Remote Access and Password Safe
(Security)
...  a value price accessible to organisations of all sizes." "Increasingly, organisations are working to maximise the productivity and effectiveness of developers and cloud ops, while reducing network complexity ...
Created on 01 February 2023
14. Boomi named a Leader for ninth consecutive time in Gartner Magic Quadrant for IPaaS, worldwide
(Company News)
... B2B/EDI network management, and data catalogue and preparation. Boomi recently announced significant updates to its platform and business, including: Product innovation Rapid API Creation – Single-click ...
Created on 01 February 2023
15. New Flashpoint report shows role of open-source intelligence in Russia's full-scale invasion of Ukrain
(Guest Research)
... wipers: This intelligence allows visibility over the tools deployed over Ukrainian and Western networks, as well as the risk of wipers being used against critical infrastructure systems in countries allied ...
Created on 01 February 2023
16. Sealy 'Strengthens Ability' to Deliver First-Class Customer Experiences by Deploying New International Data Network with blueAPACH
(Company News)
... evolved into a joint venture between the two companies that now underpins Sealy’s operations outside of the US.  Sealy of Australia’s office in Brisbane is the headquarters for a network of offices and ...
Created on 31 January 2023
17. 'New frontier of Australia’s cyber security' burgeons in South Australia as CyberArk, Australian Cyber Collaboration Centre collaborat
(Security)
... industries, it is more important than ever to foster a collaborative network of industry and emerging leaders in the sector to build stronger resilience capabilities with the right tools and knowledge ...
Created on 31 January 2023
18. IIT Madras firm develops Indian mobile operating system
(Development)
... apps on mobiles. Such users require access to private cloud services through private 5G networks. The BharOS project is funded by the Department of Science and Technology (DST), Government of India, ...
Created on 30 January 2023
19. Kallipr partners with Sydney Water in sewer monitoring IoT deployment
(Internet of Things)
... IoT devices will allow Sydney Water to build on their highly successful wastewater management project that drives the digitisation of their existing sewer networks and allows for proactive management of ...
Created on 30 January 2023
20. Australia’s reimagining of education still requires some foundational technology elements
(Guest Opinion)
GUEST OPINION by Oshadha Ranaweera, Manager for Connectivity and Network Services at Somerville: The use of digital tools to enhance learning opportunities continues to grow, but these tools - and the ...
Created on 30 January 2023
21. Why deep observability is key to closing cloud migration security gaps
(Guest Opinion)
...  My company augments log-based observability methods by going 'deep' and providing organisations with actionable network-level intelligence from immutable metadata that is used to validate the authenticity ...
Created on 30 January 2023
22. Arrow Electronics signs with QuSecure to become ‘First Large Technology Provider’ to broadly distribute Post-Quantum Cybersecurity
(Deals)
... to Arrow Electronics’ more than 220,000 commercial and federal channel partners to help them secure networks, communication and data from classical and quantum cyberattacks. By teaming with QuSecure, ...
Created on 27 January 2023
23. School staff need to increase focus on cybersecurity: survey
(Guest Opinion)
... need for training has been made even more acute with the shift to hybrid working patterns in the wake of the COVID-19 pandemic. When working from home, teaching staff are no longer protected by network ...
Created on 27 January 2023
24. US hits Windows Hive ransomware operations, seizes decryption keys
(Security)
... the ransomware gang, which were seized as part of the operation, were hosted in Los Angeles, according to the DoJ chargesheet. The DoJ said the FBI had penetrated the gang's networks, stolen decryption ...
Created on 27 January 2023
25. Data room: The unstoppable rise of real assets, visualized
(Guest Opinion)
... which is crucial for managing a sizable business network. Investors also have little faith in widely used or free cloud storage. They really should because their information may also be compromised. In ...
Created on 27 January 2023
26. Nozomi introduces Arc OT and IoT endpoint security sensor
(Security)
OT and IT security specialist Nozomi Networks has announced the Nozomi Arc OT and IoT endpoint security sensor, with automatic deployment across large numbers of sites and devices, and the ability to collect ...
Created on 25 January 2023
27. AWS launches Melbourne region
(Enterprise Cloud)
... advance battery technologies, photonics, and geospatial science. The low latency and high throughput of the AWS Region in Melbourne, combined with our high-bandwidth private fibre network, will enable ...
Created on 24 January 2023
28. How Paessler safeguards HammondCare’s IT infrastructure
(Business IT)
Australian aged-care provider HammondCare has selected Paessler PRTG to monitor its IT infrastructure across its network of aged-care homes, hospitals, and healthcare facilities to prevent outages it was ...
Created on 24 January 2023
29. Independent Research Firm Analysis found 87% Reduction in Time to Resolve Threats with ExtraHop
(Guest Research)
Study concludes that ExtraHop Reveal(x) 360 delivers cost savings and business benefits for enterprise customers COMPANY NEWS:  ExtraHop, the leader in cloud-native network detection and response, today ...
Created on 23 January 2023
30. The SonicWall NSsp 15700 brings serious network protection super powers
(Networking)
The network is more important than ever. Public cloud, hybrid cloud, remote working, B2B, EDI, APIs, mandatory data breaching, GDPR, malware … at any moment of any day your business is transacting data ...
Created on 23 January 2023
31. LogRhythm ‘enhances security analytics’ with expanded security operations capabilities
(Security)
... analyse our environment and improve our security posture,” said Eric L., Network Engineer at global manufacturing company. “Data collection and correlation to detect threats and respond can be time consuming. ...
Created on 23 January 2023
32. CommsScope introduces Wi-Fi 6E products that can penetrate MDUs
(Wi-Fi)
Network connectivity solutions provider CommScope introduces two new Wi-Fi 6E products—the Ruckus R760 and R560—that allow multi-dwelling units (MDUs) including residential apartments, student housing, ...
Created on 23 January 2023
33. Chinese 8220 Gang targets public clouds and vulnerable applications
(Guest Research)
... and exploited TCP port in Radware's Global Deception Network in 2022, up from the tenth position in 2021. According to Radware head of research of cyber threat intelligence Daniel Smith, "The threat to ...
Created on 20 January 2023
34. How to secure your customers’ personally identifiable information against compromise
(Security)
... often-overlooked components of an organisation’s DLP strategy. As the name suggests, data discovery tools scan applications, networks, and endpoints for PII, which is then classified into sub-groups by ...
Created on 19 January 2023
35. Why you need to make cybersecurity an urgent priority
(Security)
... as an afterthought. Securing systems and networks containing sensitive and valuable data must be an imperative.” There are three critical reasons why businesses must make cybersecurity an urgent priority: ...
Created on 19 January 2023
36. Deep Fakes may replicate digital humans this year
(Security)
... started the Bring Your Own Office transformation, where employees’ home networks have become cloud droplets or mini clouds. The big challenge today is knowing where the organisation’s security starts ...
Created on 19 January 2023
37. Nozomi Networks Labs report finds ruin vs. ransom dominates 2022 threat landscape
(Guest Research)
GUEST RESEARCH: The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape. Continuing ...
Created on 19 January 2023
38. Why software patching is critical for effective IT security
(Guest Opinion)
... in corporate networks actually date back to 2016 or earlier. This is despite the fact that patches have been available for more than five years. In some cases, vulnerabilities that continue to be exploited ...
Created on 19 January 2023
39. WatchGuard hires Yeo as senior vice president of operations
(People Moves)
... decades of industry experience. He most recently served as CIO at Barracuda Networks, and previously worked as vice president of technical operations at Upwork (formerly Elance), Tout.com and. meebo. ...
Created on 19 January 2023
40. Rubrik surpasses $500 million in subscription ARR; appoints former Palo Alto Networks chairman and CEO Mark McLaughlin to board of directors
(Company News)
... Palo Alto Networks chairman and CEO, to Rubrik’s board of directors. McLaughlin is a distinguished cybersecurity veteran with more than 25 years of experience leading companies including Palo Alto Networks ...
Created on 19 January 2023
41. Verizon Mobile launches Verizon Mobile for Microsoft Teams
(Business Telecoms)
American mobile phone network company Verizon announced the availability of Verizon Mobile for Microsoft Teams, a new service that integrates mobile devices with Microsoft Teams for calling and collaboration. ...
Created on 18 January 2023
42. Hungry Jacks and Hickory enlist TPG Telecom’s 5G services
(Business Telecoms)
... a fixed wireless service, which connects business sites with via the TPG Telecom 5G mobile network, and a 5G-backup SD-WAN (software-defined wide area network) service, which means business customers can ...
Created on 18 January 2023
43. Why Zero Trust is the Best Security Strategy for 2023
(Guest Opinion)
... network protected by a centralised firewall. Defining zero trust Ask five IT professionals to define zero trust and you are highly likely to get five different answers. The concept is used by security ...
Created on 18 January 2023
44. Service mesh is breaking free of the 'foggy visibility' phase of its evolutio
(Guest Opinion)
... than done. We know that many development teams experience delayed or slowed down application deployments into production. This can be for a variety of reasons, from application networking or security ...
Created on 18 January 2023
45. Hitachi Vantara partners with Model9 to 'accelerate Mainframe Data Modernisation
(Deals)
... how our strong partner network is able to drive trusted solutions and profitable outcomes for customers.” "The reality is that mainframe modernisation takes time, and it’s critical that businesses are ...
Created on 18 January 2023
46. Digital Trust now critical for maintaining customer loyalty
(Guest Opinion)
... surface that makes it harder than ever to manage network security. There is no edge to protect anymore, making proactive protective action for every device, every cloud and every sensor an essential part ...
Created on 18 January 2023
47. Jamf ends 2022 helping approximately 71,000 customers succeed with Apple
(Company News)
... before they put users or devices at risk. Jamf Protect received important updates including: • Network threat prevention, which added network-based indicators of compromise into the solution • Powerful ...
Created on 18 January 2023
48. Juniper Networks and NEC upgrade Powerco’s Wi-Fi network
(Energy)
Gas and electricity distributor Powerco has selected AI-driven network Juniper Networks and IT and network transformation services provider NEC to design and deploy new Wi-Fi network across its sites nationwide. ...
Created on 17 January 2023
49. SOTI predicts four key technology trends for 2023
(Company News)
... said Dyson. Cloud security and the growth of zero trust The concept of zero trust – where anything and anyone trying to access a corporate network or corporate data should be considered untrustworthy ...
Created on 17 January 2023
50. iTWireTV interview: Ami Badani and John F. Kim on the NVIDIA Bluefield DPU
(Guest Interviews)
... we’re joined by NVIDIA VP Networking Ami Badani and NVIDIA Director of Storage Marketing and Bluefield DPU John F. Kim. In our conversation, Ami and John explain what a DPU is, and why NVIDIA has developed ...
Created on 17 January 2023
  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next
  • End
  • Home
  • Latest News
  • Your IT
  • Business IT
  • IT Industry
  • NEWSLETTER
  • MAGAZINE
  • IT People
  • Government
  • RSS

Services

  • Promotional News & Content
  • Sponsored Announcements
  • Self Posting
  • JobZilla IT Jobs
  • See Newsletter
  • Our Journalists

Company

  • About
  • Contact
  • Advertising Specs
  • Advertise NOW
  • Privacy
  • Editorial Guidlines& Complaints Handling
  • Sitemap

Connect

Facebook
Twitter
Cloud Hosting by Digital Pacific