• Subscribe to Newsletter
  • Advertise
iTWire iTWire iTWire
  • Home
    • About iTWire
    • About iTWire - Advertising, Sponsored Posts, Editorial & Press Releases
    • About our News site
    • Advertise in Newsletter
    • Advertise on iTWire
    • Advertising Specs
    • Advertorials
    • Commswire Subscription
    • Contact CEO
    • Contact Editor
    • Current Webinars
    • Interviews
    • iTWire News Site Editor
    • Lead Generation
    • Newsletter Editor
    • Our Journalists
    • Press Releases
    • Promotional News
    • Reviews
    • See Latest Newsletter
    • Commswire Newsletter Example
    • Sponsored News
    • Webinar Promotion
    • Zoom Interviews
  • Your Tech
    • Browse News
      • Entertainment & Gaming
      • Mobility
      • Home Tech
      • Wi-Fi
      • Apps
      • Internet of Things
  • Business
    • Browse News
      • iTWire Marketing
      • Networking
      • Open Source
      • Security & Cybersecurity
      • Business Telecommunications
      • Enterprise Solutions
      • Print Solutions
      • Hardware
      • Storage & Cloud Storage
      • Business Software
      • Cloud
      • Data Analytics & Artificial Intelligence
      • Data Centres
      • MVNO
      • Managed Services
      • Accounting Software
      • Business Intelligence
  • Industry
    • Browse News
      • Deals
      • Channel News & Partnerships
      • Cloud Accounting
      • Enterprise Cloud
      • Virtualisation
      • Web Development & Front-End Development
      • Telecoms & NBN
      • Manufacturing & Logistics
      • Web Hosting
      • VoIP
      • Strategy
      • Listed Tech
      • Market
      • Application Performance
      • CRM & Contact Center Apps
  • People
    • Browse News
      • Career Coach
      • Recruitment
      • Not For Profit
      • Education & Machine Learning
      • People Moves
      • CIO Trends
      • Enterprise Staff
      • Remote Working
  • GOVT
    • BROWSE NEWS
      • Government Tech Policy
      • Technology Regulation
      • Technology Tenders
      • Local Government
  • Science
    • Browse News
      • Energy
      • Climate
      • Health
      • Biology
      • Automotive
      • Space
    • Water Resources
    • Environment
    • Mining here
  • Opinion
    • Browse
      • Apexing the Linux learning curve
      • ShrinkAge
      • The Big House
      • Fuzzy Logic - Alex Zaharov-Reutt
      • Seeking Nerdvana
      • Open Sauce - Sam Varghese
      • A Meaningful Look
      • Transit
      • Business Intelligence Blog
      • ShawThing
    • Browse
      • Stephen Withers
      • Whiskey Tango Foxtrot - David Heath
      • Linux Distillery - David M Williams
      • UNI-verse
      • Radioactive IT
      • Cornered!
      • Beerfiles
      • ICT Energy and Sustainability
      • Wired CIO - David M Williams
      • C Level
  • Reviews
    • Browse
      • Computers & Peripherals
      • Smartphones & Mobile Devices
      • Software
      • Networking
      • Books
      • Games
  • Guest Articles
    • Guest Opinion
    • Guest Reviews
    • Guest Interviews
    • Webinars & Online Events
    • Guest Research
    • Company News
  • CHANNELS
  • ITWIRE TV

Total: 307 results found.

Search for:
Search Only:
1. Why deep observability is key to closing cloud migration security gaps
(Guest Opinion)
... the most informed cybersecurity experts in the information technology (IT) and security community. With the alarming rise in online threats being top of mind for cyber professionals, we discussed some ...
Created on 30 January 2023
2. Abraham’s Ax emerges as new persona from Iranian hacking group Cobalt Sapling targeting Saudi Arabia for political leverage
(Company News)
COMPANY NEWS: Secureworks, a global leader in cybersecurity, published its latest analysis today from its Counter Threat Unit (CTU), revealing that Iranian threat group Cobalt Sapling, has re-emerged with ...
Created on 30 January 2023
3. Arrow Electronics signs with QuSecure to become ‘First Large Technology Provider’ to broadly distribute Post-Quantum Cybersecurity
(Deals)
Post-quantum cybersecurity software provider QuSecure today announced it has signed a software distribution agreement with Arrow Electronics,, a value-added distributor. QuSecure says that now QuProtect ...
Created on 27 January 2023
4. School staff need to increase focus on cybersecurity: survey
(Guest Opinion)
... there is a pressing need for more cybersecurity awareness training. Staff need to understand the dangers that can be contained within emails and the steps that should be taken to minimise risks. The ...
Created on 27 January 2023
5. ‘Increased cyberattacks’ on fashion businesses: Tenable
(Security)
... rise in regulatory demands, and customers’ high expectations for digital experiences, it is urging fashion brands to strengthen their cyber defences and make Active Directory (AD) security a strategic ...
Created on 25 January 2023
6. Nozomi introduces Arc OT and IoT endpoint security sensor
(Security)
OT and IT security specialist Nozomi Networks has announced the Nozomi Arc OT and IoT endpoint security sensor, with automatic deployment across large numbers of sites and devices, and the ability to collect ...
Created on 25 January 2023
7. Independent Research Firm Analysis found 87% Reduction in Time to Resolve Threats with ExtraHop
(Guest Research)
... and significant savings from retiring legacy security solutions. Forrester's analysis of the benefits concluded that "Reveal(x)360 decreases time to threat detection by 83% and time to threat resolution ...
Created on 23 January 2023
8. The SonicWall NSsp 15700 brings serious network protection super powers
(Networking)
... and it is crucial it does so rapidly, securely, reliably, and cost-effectively. SonicWall has launched its remarkable Network Security services platform device, the NSsP 15700 firewall, which brings serious ...
Created on 23 January 2023
9. LogRhythm ‘enhances security analytics’ with expanded security operations capabilities
(Security)
Security intelligence company, LogRhythm has announced a series of expanded capabilities and integrations for its security operations solutions. LogRhythm says the updates propel its ability to be ...
Created on 23 January 2023
10. Australia is well set up to be a leader in IT/OT convergence
(Guest Opinion)
... to achieving efficiency dividends and improving prospects of a successful digital transformation, companies must also consider the cybersecurity implications of pursuing such a strategy. For many organisations, ...
Created on 23 January 2023
11. Chinese 8220 Gang targets public clouds and vulnerable applications
(Guest Research)
... poor security hygiene, low-skilled groups like the 8220 Gang are able to cause a significant impact to targeted systems." Why it matters • It is not the first time Redis is subject to exploit activity ...
Created on 20 January 2023
12. How to secure your customers’ personally identifiable information against compromise
(Security)
... customers, they are also required to protect PII under the general data protection regulation (GDPR). M-Files director of security and compliance Saara Hasu-Varttila said, “Businesses of all sizes have ...
Created on 19 January 2023
13. Why you need to make cybersecurity an urgent priority
(Security)
... Cyber Security Centre (ACSC) reported a significant jump in the number and sophistication of cyber threats, receiving approximately 76,000 cybercrime reports, a 13 per cent increase from the previous financial ...
Created on 19 January 2023
14. Cohesity appoints Victor Keong as Field CISO for Asia-Pacific & Japan
(Company News)
COMPANY NEWS: Cohesity, a leader in data management and data security, announced the appointment of Victor Keong as Field Chief Information Security Officer for Asia-Pacific & Japan. Victor will play a ...
Created on 19 January 2023
15. Deep Fakes may replicate digital humans this year
(Security)
GUEST OPINION The digital world is evolving quickly with artificial intelligence and quantum computing expected to soon become a reality. When it comes to cybersecurity, we cannot just sit back and wait ...
Created on 19 January 2023
16. Nozomi Networks Labs report finds ruin vs. ransom dominates 2022 threat landscape
(Guest Research)
GUEST RESEARCH: The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape. Continuing ...
Created on 19 January 2023
17. Why software patching is critical for effective IT security
(Guest Opinion)
...  Software vendors are constantly releasing updates to their code designed to plug security holes and ward off attacks. However, unfortunately, many of their customers are failing to take advantage of ...
Created on 19 January 2023
18. Rubrik surpasses $500 million in subscription ARR; appoints former Palo Alto Networks chairman and CEO Mark McLaughlin to board of directors
(Company News)
COMPANY NEWS: Rubrik, the zero trust data security company, today announced it has surpassed US$500 million in software subscription annual recurring revenue (ARR). Additionally, the company achieved a ...
Created on 19 January 2023
19. Why Zero Trust is the Best Security Strategy for 2023
(Guest Opinion)
GUEST  OPINION  by Michael Bovalino, ANZ Country Manager, LogRhythm:  As they map out their plans for the year ahead, many corporate IT security teams are considering whether a zero-trust strategy will ...
Created on 18 January 2023
20. Digital Trust now critical for maintaining customer loyalty
(Guest Opinion)
... surface that makes it harder than ever to manage network security. There is no edge to protect anymore, making proactive protective action for every device, every cloud and every sensor an essential part ...
Created on 18 January 2023
21. Jamf ends 2022 helping approximately 71,000 customers succeed with Apple
(Company News)
... on approximately 30 million devices worldwide. 2022 was a pivotal year for Jamf as it continued to build the only complete management and security solution for an Apple-first environment that is enterprise ...
Created on 18 January 2023
22. Absolute ‘deepens commitment’ to public sector, achieves FedRAMP Ready Designation
(Security)
Cyber security company Absolute Software has announced that it has earned a Federal Risk and Authorisation Management Program (FedRAMP) Ready designation suitable for a FedRAMP JAB Authorisation. The ...
Created on 16 January 2023
23. 5 Simple Things You Can Do To Navigate Safe Online
(Guest Opinion)
... and more. By choosing the right program for you, you'll be able to safely enjoy all the web has to offer without any risks. Keep your computer's security software up to date Staying up to date with your ...
Created on 11 January 2023
24. 5 Tech innovations to enhance physical security operations
(Guest Opinion)
GUEST OPINION: Currently, physical security operations require you to use intelligent methods to enhance safety in your organisation. Typically, these involve using the latest tools and technologies to ...
Created on 03 January 2023
25. Average Cost of Data Breaches Expected to Surpass $5 Million Per Incident in 2023: Acronis
(Guest Research)
... and a security forecast for 2023. Of note, the report found that threats from phishing and malicious emails have increased by 60%, and the average cost of a data breach is expected to reach $5 million ...
Created on 29 December 2022
26. Prioritise Cyber Resilience and Cybersecurity Basics to Help Your Organisation Start 2023 Right
(Guest Opinion)
... citizen impact of the attacks. The stark security challenges that Australian organisations face are demonstrated in a survey we commissioned of IT and SecOps decision-makers (conducted by Censuswide ...
Created on 22 December 2022
27. Ivanti appoints Michael Coleman to grow ANZ partner channel
(People Moves)
... said Coleman. “With the increase in cyber threats, it is more important than ever for businesses to prioritise and streamline their security measures. As Ivanti is one of the only companies that combines ...
Created on 22 December 2022
28. Five Tech Trends That Will Impact Australia in 2023
(Guest Opinion)
... energy goals and lower their overall carbon footprint. Cybersecurity This past year has illustrated the real and growing threat of sophisticated and opportunistic cyber-attacks on Australian organisations. ...
Created on 21 December 2022
29. Predictions: What 2023 Has in Store for Aussie Businesses
(Guest Opinion)
... strategic plans will deliver significant benefits as the year unfolds. The key trends to note fall into four broad categories: cloud platforms and services, IT security, networks and connectivity, and ...
Created on 21 December 2022
30. Increased cyber security requirements for systems connecting to My Health Record
(Health)
... and allied health services, connected to the My Health Record system. The agency says security requirements profile will be effective from April 2023 following a 3-month period where industry is invited ...
Created on 21 December 2022
31. Cost of doing nothing: Australian organisations are gambling on cybersecurity
(Guest Opinion)
GUEST OPINION Ask any CEO or senior business leader what’s been keeping them up at night over the past few months and it’s almost guaranteed cybersecurity will be on that list. After getting by unaffected ...
Created on 21 December 2022
32. The cost of doing nothing: Australian organisations are gambling on cybersecurity
(Security)
GUEST OPINION Ask any CEO or senior business leader what’s been keeping them up at night over the past few months and it’s almost guaranteed cybersecurity will be on that list. After getting by unaffected ...
Created on 21 December 2022
33. Holiday shopping threats to security
(Guest Research)
... channels: Analysts from Flashpoint say that “Retailers can help mitigate fraud and other cybersecurity issues this holiday season by establishing a clear and formalised communication channel with their ...
Created on 20 December 2022
34. The future is quantum – how organisations can prepare themselves
(Guest Opinion)
... security leaders might think they have time to prepare, the post-quantum era has already begun—and many companies are currently ill-equipped to handle such development. In a study by (ISC)², the global ...
Created on 20 December 2022
35. Nozomi: 2023 - A crucial year for cybersecurity developments in OT and ICS Industries
(Guest Opinion)
GUEST OPINION: As cybersecurity moves into 2023, the trends from the past few years remain firmly in place. Australian organisations are increasingly focused on optimising their use of technology, and ...
Created on 20 December 2022
36. Ok boomer - Palo Alto Networks research finds Baby Boomers better at password reuse than Gen Z
(Security)
With a string of high-profile cyber attacks on Australian businesses in recent months, chances are high that it will happen again. Palo Alto Networks research found cyber security awareness still needs ...
Created on 19 December 2022
37. Gigamon third quarter 2022 cloud services revenue grows over 100% YoY, solidifying leadership in deep observability market
(Company News)
... these complex networks inadvertently create security and performance blind spots that can leave organisations exposed to security threats and attacks. Over 52 million cyber-attacks took place in the ...
Created on 19 December 2022
38. Zimperium discovers novel predatory loan malware hiding in mobile apps developed with Flutter
(Company News)
COMPANY NEWS: After loaning money, criminals behind MoneyMonger blackmail victims with personal information stolen from their device. Zimperium, the only mobile security platform purpose-built for ...
Created on 19 December 2022
39. KPMG and Vectra AI join forces to ‘reduce cyber risk’ for hybrid cloud enterprises
(Company News)
COMPANY NEWS: Professional services firm KPMG has partnered with security provider Vectra to bolster its AI-driven behavioural attack intelligence with KPMG’s Cyber Security services. Vectra is part ...
Created on 18 December 2022
40. Security program development in business
(Guest Opinion)
... to resolve than prevent, so companies need to have a solid security program. A security program combines a company’s security policies, tools, procedures and controls. In other words, it is the robust ...
Created on 17 December 2022
41. Claroty joins World Economic Forum as ‘global innovator’
(Strategy)
Cyber security company Claroty has joined the World Economic Forum’s World Economic Forum's Global Innovators Community, an invitation-only group of the world’s most promising start-ups and scale-ups that ...
Created on 16 December 2022
42. F5 expands SaaS-based security portfolio with launch of F5 distributed cloud app infrastructure protection
(Company News)
... infrastructures. Powered by technology acquired with Threat Stack, AIP is the newest addition to the F5 Distributed Cloud Services portfolio of cloud-native SaaS-based application security and delivery ...
Created on 16 December 2022
43. Red Hat enhances Insights with new capabilities
(Market)
... security strategy. “With the convenience of bringing Insights’ analytics directly into ticketing and workflow systems, customers can use the tools they are already familiar with while more easily adopting ...
Created on 16 December 2022
44. Rubrik appoints Thompson as lead independent board director
(People Moves)
Data security specialist Rubrik has appointed John W. Thompson as its lead independent director. "We've built an elite leadership team of cybersecurity experts across public and private sectors to better ...
Created on 16 December 2022
45. Motorola Solutions creates an online reporting portal for Crime Stoppers Tasmania to strengthen public safety
(Business Telecoms)
... agencies and first responders. The deployment also includes cyber security support and vulnerability testing to help keep public data safe. Crime Stoppers Tasmania chair David Daniels said the portal ...
Created on 15 December 2022
46. Australia Leads Global Race To Invest In The Metaverse Despite Security Concerns: Tenable study
(Security)
... respondents (44%) said managing cybersecurity risk, while 38% said managing privacy and the collection of information, were the biggest threats to their organisations when considering investing in the ...
Created on 15 December 2022
47. The top technology trends set to shape the remainder of the 2020s
(Guest Opinion)
... systems such as Chrome Flex OS are designed to bring a modern, supportable feel to older and obsolete devices, without sacrificing security or performance. Many people and organisations will benefit from ...
Created on 15 December 2022
48. iTWire TV: Alex Tilley on Infostealers and how businesses and individuals can combat them
(Guest Interviews)
... bite-sized pieces. With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Alex was at the forefront of research and countermeasures ...
Created on 15 December 2022
49. Proofpoint signs Definitive Agreement to Acquire Illusive
(Deals)
Cybersecurity and compliance company Proofpoint has entered into a definitive agreement to acquire Identity Threat Detection and Response (ITDR)​ provider Illusive. Proofpoint says the acquisition ...
Created on 13 December 2022
50. Cybersecurity resilience a top priority for Australian organisations: report
(Security)
Seventy percent of Australian organisations surveyed said security incidents have affected business operations in the last two years, so it's not surprising that cybersecurity resilience is a top priority, ...
Created on 13 December 2022
  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next
  • End
  • Home
  • Latest News
  • Your IT
  • Business IT
  • IT Industry
  • NEWSLETTER
  • MAGAZINE
  • IT People
  • Government
  • RSS

Services

  • Promotional News & Content
  • Sponsored Announcements
  • Self Posting
  • JobZilla IT Jobs
  • See Newsletter
  • Our Journalists

Company

  • About
  • Contact
  • Advertising Specs
  • Advertise NOW
  • Privacy
  • Editorial Guidlines& Complaints Handling
  • Sitemap

Connect

Facebook
Twitter
Cloud Hosting by Digital Pacific