• Subscribe to Newsletter
  • Advertise
iTWire iTWire iTWire
  • Home
    • About iTWire
    • About iTWire - Advertising, Sponsored Posts, Editorial & Press Releases
    • About our News site
    • Advertise in Newsletter
    • Advertise on iTWire
    • Advertising Specs
    • Advertorials
    • Commswire Subscription
    • Contact CEO
    • Contact Editor
    • Current Webinars
    • Interviews
    • iTWire News Site Editor
    • Lead Generation
    • Newsletter Editor
    • Our Journalists
    • Press Releases
    • Promotional News
    • Reviews
    • See Latest Newsletter
    • Commswire Newsletter Example
    • Sponsored News
    • Webinar Promotion
    • Zoom Interviews
  • Your Tech
    • Browse News
      • Mobility
      • Home Tech
      • Wi-Fi
      • Apps
      • Internet of Things
    • Entertainment & Gaming
  • Business
    • Browse News
      • iTWire Marketing
      • Networking
      • Open Source
      • Security & Cybersecurity
      • Business Telecommunications
      • Enterprise Solutions
      • Print Solutions
      • Hardware
      • Storage & Cloud Storage
      • Business Software
      • Cloud
      • Data Analytics & Artificial Intelligence
      • Data Centres
      • MVNO
      • Managed Services
      • Accounting Software
      • Business Intelligence
  • Industry
    • Browse News
      • Deals
      • Channel News & Partnerships
      • Cloud Accounting
      • Enterprise Cloud
      • Virtualisation
      • Web Development & Front-End Development
      • Telecoms & NBN
      • Manufacturing & Logistics
      • Web Hosting
      • VoIP
      • Strategy
      • Listed Tech
      • Market
      • Application Performance
      • CRM & Contact Center Apps
  • People
    • Browse News
      • Career Coach
      • Recruitment
      • Not For Profit
      • Education & Machine Learning
      • People Moves
      • CIO Trends
      • Enterprise Staff
      • Remote Working
  • GOVT
    • BROWSE NEWS
      • Government Tech Policy
      • Technology Regulation
      • Technology Tenders
      • Local Government
  • Science
    • Browse News
      • Energy
      • Climate
      • Health
      • Biology
      • Automotive
      • Space
    • Water Resources
    • Environment
    • Mining here
  • Opinion
    • Browse
      • Apexing the Linux learning curve
      • ShrinkAge
      • The Big House
      • Fuzzy Logic - Alex Zaharov-Reutt
      • Seeking Nerdvana
      • Open Sauce - Sam Varghese
      • A Meaningful Look
      • Transit
      • Business Intelligence Blog
      • ShawThing
    • Browse
      • Stephen Withers
      • Whiskey Tango Foxtrot - David Heath
      • Linux Distillery - David M Williams
      • UNI-verse
      • Radioactive IT
      • Cornered!
      • Beerfiles
      • ICT Energy and Sustainability
      • Wired CIO - David M Williams
      • C Level
  • Reviews
    • Browse
      • Computers & Peripherals
      • Smartphones & Mobile Devices
      • Software
      • Networking
      • Books
      • Games
  • Guest Articles
    • Guest Opinion
    • Guest Reviews
    • Guest Interviews
    • Webinars & Online Events
    • Guest Research
    • Company News
  • CHANNELS
  • ITWIRE TV

Total: 300 results found.

Search for:
Search Only:
1. Parent firm of Indian defence contractor hit by Windows Alphv ransomware
(Security)
... to India's Hindustan Times newspaper, EEL has signed a deal with the defence ministry to supply a million multi-mode hand grenades to the army. EEL is also manufacturing enhanced range Pinaka rockets which ...
Created on 30 January 2023
2. ‘Increased cyberattacks’ on fashion businesses: Tenable
(Security)
... AD environments which can be complex and time-consuming and can be difficult to ensure that all systems and data are properly integrated and secured,” warns Tenable. “Supply chain attacks target vulnerable ...
Created on 25 January 2023
3. Samsung unveils new PC SSD
(Business IT)
... that develops open standards for computing security. Dice securely generates cryptographic keys inside the SSD, providing device authentication to protect against supply chain attacks — cyberattacks ...
Created on 17 January 2023
4. Five Tech Trends That Will Impact Australia in 2023
(Guest Opinion)
... actors and the SolarWinds hack highlighted how the supply chain can be vulnerable to threats that seep through connected ecosystems. According to the CSIRO’s Futures series, a globally competitive Australian ...
Created on 21 December 2022
5. Holiday shopping threats to security
(Guest Research)
... The global supply chain is still recovering from the impacts of the pandemic and related shutdowns, labour shortages, high inflation rates, and delays in transport. As Flashpoint analysts have witnessed ...
Created on 20 December 2022
6. Kyndryl execs reveal what's in store in tech in 202
(Guest Opinion)
... edge will be key to unlocking the next generation of technological innovation from enabling autonomous vehicles, real-time analytics, edge data collection (IoT), asset tracking and supply chain optimisation.” ...
Created on 19 December 2022
7. Pure Storage’s technical leadership team in Asia Pacific & Japan share their predictions for 2023
(Company News)
... Service Economy expanding even further in 2023,” said Mark Jobbins, Vice President & Chief Technology Officer, APJ, Pure Storage. Supply chain Manufacturing processes will be re-architected to mitigate ...
Created on 15 December 2022
8. The top technology trends set to shape the remainder of the 2020s
(Guest Opinion)
... without power and disrupt everything from supply chains to banking transactions. 4. Evolving from technology recycling to upcycling Currently the recycling of technology tends to focus on braking down ...
Created on 15 December 2022
9. : Abusing JSON-based SQL to bypass WAF
(Guest Research)
... understand. If we could supply a SQLi payload that the WAF will not recognize as valid SQL, but the database engine will parse it, we could actually achieve the bypass. As it turns out, JSON was exactly ...
Created on 15 December 2022
10. Venafi releases top 10 cybersecurity trends for 2023
(Guest Opinion)
... attacks. Their value will only increase this coming year." – Kevin Bocek 2. "In 2023, we will see continued efforts to manage the risk posed by software supply chain attacks, with more start-ups and ...
Created on 13 December 2022
11. Vectra AI Extends Support for Amazon Security Lake
(Company News)
... – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting ...
Created on 12 December 2022
12. Ten Key Security Trends to Watch in 2023
(Guest Opinion)
... and real-time monitoring and response. 5. Supply chain attacks will be ongoing: Unfortunately, 2022 became the year of the supply chain attack with a large number of high-profile incidents occurring ...
Created on 12 December 2022
13. Top Cybersecurity Trends to Watch in 2023
(Guest Opinion)
... some of the predicted trends to watch across the APAC region in the cybersecurity space include: Supply-chain attacks will be a big threat for businesses using open-source software: Increasing numbers ...
Created on 12 December 2022
14. DigiCert Releases Cybersecurity Predictions for 2023 and Beyond
(Guest Research)
... Supply Chain Attacks Will Make 2023 the Year of the SBOM — An SBOM is a list of every software component that comprises an application and includes every library in the application’s code, as well as services, ...
Created on 09 December 2022
15. iTWireTV INTERVIEW: Daltrey founder and CEO, Blair Crawford, explains why cyber-security starts with strong authentication
(Guest Interviews)
... accountability, and transparency on factors including employee benefits, charitable giving and ethical supply chain practices and input materials. The company also notes cybersecurity is a war of attrition, ...
Created on 08 December 2022
16. VIDEO INTERVIEW: Daltrey founder and CEO, Blair Crawford, explains why cyber-security starts with strong authentication
(Security)
... accountability, and transparency on factors including employee benefits, charitable giving and ethical supply chain practices and input materials. The company also notes cybersecurity is a war of attrition, ...
Created on 08 December 2022
17. Optus, Medibank – and supply chains flying under the radar…
(Guest Opinion)
GUEST OPINION: While repercussions from the recent hacker attacks on Australia's Optus and Medibank are still resounding as media writers estimate ever higher damage costs, attacks on supply chain targets ...
Created on 07 December 2022
18. If you thought 2022 was unpredictable, expect 2023 to be more of the same
(Guest Opinion)
GUEST OPINION by Peter Murphy, Head of Consulting, Atturra Advisory:  The past 12 months have proven particularly challenging for Australian businesses. Faced with everything from cyberattacks and supply ...
Created on 07 December 2022
19. Ten key security trends to watch in 2023
(Guest Opinion)
... is likely to be countered by a growing understanding that cyberthreats are active and evolving and need intelligent, automated, and real-time monitoring and response. 5. Supply chain attacks will be ...
Created on 30 November 2022
20. Can cyber criminals smell the fear? Darktrace predicts what will happen and proposes what we should do as we move into 2023
(Security)
... rushes to the cloud “These third-party supply chains offer those with criminal intent more places to hide and targeting cloud providers instead of a single organisation gives attackers more bang for their ...
Created on 24 November 2022
21. EU to impose tighter cybersecurity measures
(Security)
... supply chain security, encryption and vulnerability disclosure, among other provisions. “Essential sectors” such as the energy, transport, banking, health, digital infrastructure, public administration ...
Created on 17 November 2022
22. Aqua Security combats rising zero-day attacks with eBPF Lightning Enforcer
(Company News)
... and stop the most advanced attacks in real time. While 'shift left' security is a key piece to prevent vulnerabilities, misconfigurations and supply chain threats from reaching production environments, ...
Created on 16 November 2022
23. Cybersecurity begins at the edge – here are 3 tips to build resilience
(Guest Opinion)
... and services to securing development lifecycles and the supply chain. 3. Cultivating a security culture While new hardware, firmware and software can help enhance an organisation’s security defence, ...
Created on 15 November 2022
24. Aqua Security offers only enterprise-grade software supply chain solution to meet US Executive Order
(Company News)
COMPANY NEWS: Aqua Security, the leading pure-play cloud native security provider, today announced that it is the only enterprise-grade vendor providing software supply chain security attestation to meet ...
Created on 10 November 2022
25. Research Finds Organisations are increasing modern data protection for cloud workloads to reduce cyber security risks: Veeam
(Security)
Companies are recognising the increasing need to protect their SaaS environments, according to the latest Cloud Protection Trends 2023 report from ackup and data management specialist Veeam. According ...
Created on 04 November 2022
26. Nozomi Networks-sponsored SANS survey finds security defences are getting stronger as cyber threats to OT environments remain high
(Guest Research)
... Non-ransomware criminal attacks came in third (cited by 32.1%), followed closely by hardware/software supply chain risks (30.4%). • While the number of respondents who said they had experienced a breach ...
Created on 02 November 2022
27. VMware fixes remotely exploitable flaw in open-source library XStream
(Security)
... easy to exploit and may see in-the-wild exploitation in the near future. "While this vulnerability isn’t on the level of the Log4j flaws, it serves as a reminder of the supply chain risks through the ...
Created on 29 October 2022
28. New Genetec research shows cybersecurity remains a top concern for physical security professionals worldwide
(Security)
... who offer higher levels of automation to stay on top of potential threats. They will also need to scrutinise their entire supply chain and demand continuous verification, rather than just hardening networks ...
Created on 28 October 2022
29. Thomson Reuters leaves terabytes of data exposed on Web: report
(Security)
... serious ramifications. For example, this practice would lead to a supply chain cyber attack," it added. Australia has recently witnessed nine data breaches in a little over a month, these being at Optus, ...
Created on 28 October 2022
30. Aqua Security more than doubles revenue
(Company News)
... recent White House executive order highlights emerging threats to the software supply chain and guidance from both the NSA and CISA recommends secure software development practices that align with the ...
Created on 24 October 2022
31. Sysdig Threat Report reveals victims lose $81.53 for every $1.54 cryptojackers gain
(Guest Research)
... take advantage of assets, and gain illicit network access. It’s clear that container images have become a real attack vector, rather than a theoretical risk. Key findings: Supply chain attacks on containers ...
Created on 04 October 2022
32. Pronto Xi 770 ERP released with enhanced security, compliance, single touch payroll phase 2, and more
(Enterprise Solutions)
... supply chain challenges head-on. Some organisations see their ERP as little more than "the accounting system," but with supply chain constraints and the need for digital transformation under the spotlight ...
Created on 27 September 2022
33. Australia makes ‘great progress’ addressing security threats against economy: report
(Company News)
... medical devices, as critical when putting cyber protection in place. What they need to do is look at the complete picture, including patient data and supply chains, which are just as critical in enabling ...
Created on 26 September 2022
34. Aqua Security addresses software supply chain attacks
(Security)
Cloud-native security provider Aqua Security has launched what it says is the industry's first and only end-to-end software supply chain security solution. The Aqua Supply Chain Solution is part of ...
Created on 21 September 2022
35. The seven habits of highly trustworthy devices
(Guest Opinion)
... digital transformation should be to manufacture devices at a scale that offers operational resilience, supply chain risk management, and clear visibility and controls for tamper-resistance, alongside anti-cloning, ...
Created on 20 September 2022
36. GoTo Partner Network now includes GoTo Resolve for MSPs
(Company News)
... a first-of-its-kind zero trust security architecture within an RMM solution, safeguarding MSPs and their customers from increasingly prevalent software supply chain attacks. “We are excited to enable ...
Created on 15 September 2022
37. CyberArk explains what the critical infrastructure protection act means for you
(Security)
... mandates around providing a software bill of materials as part of securing the software supply chain for greater transparency.   What advice can you give companies on how they can identify, track, ...
Created on 11 September 2022
38. Investor lawsuit against SolarWinds over breach dismissed
(Security)
... were exposed in December 2020 when American cyber security firm FireEye claimed to have identified a global campaign to compromise public and private sector bodies by corrupting software supply chains. ...
Created on 09 September 2022
39. 3 Pillars to software supply chain security
(Guest Opinion)
GUEST OPINION: Software supply chain attacks have accelerated in recent years, aiming to hit organisations’ developer environments. There have been regular instances of successful attacks, including ...
Created on 01 September 2022
40. How to protect against the growing fileless malware threat
(Guest Opinion)
... what fileless attacks are, and how to protect against them. Malware is malicious code intended to damage software, steal information or take full control of a supply chain. It can take on several forms: ...
Created on 31 August 2022
41. Hardening physical security to protect against cyberattacks
(Guest Opinion)
... patches. Define who is responsible for maintaining awareness of when updates are available, and who vets, deploys and documents updates on all devices and systems.  Supply chain. Ensure that all suppliers ...
Created on 17 August 2022
42. Dynatrace extends vulnerability analysis
(Security)
... from any part of the software supply chain, including open-source or third-party components and application runtimes," said Dynatrace senior vice president of product management Steve Tack. "Traditional ...
Created on 15 August 2022
43. ‘Highly sensitive’ protocols exposed to public Internet, warns ExtraHop
(Security)
... challenges faced when delivering a cybersecurity posture fit for purpose and aligned with industry regulation, Essential Eight compliance and both internal employee and external supply chain security.” ...
Created on 10 August 2022
44. Cyberthreats impacting Australian and New Zealand businesses: Fortinet
(Security)
... of supply chain issues, food supply challenges, and refugee crises being exploited by cybercriminals looking to cause disruption to businesses. Cyberterrorism also continues to be a major threat to businesses ...
Created on 22 July 2022
45. Stuck in first gear: Australia falls behind on Zero Trust
(Guest Opinion)
GUEST OPINION: Over the past two years, the focus for many enterprise organisations has been on accelerating digital transformation efforts, expanding software supply chains and increasing connectivity ...
Created on 22 July 2022
46. Australian businesses need to stop neglecting supply chain security risks
(Guest Opinion)
GUEST OPINION: Software supply chain compromise is among the top five threats of most concern to Australian organisations An organisation's software supply chain consists of all the companies it buys ...
Created on 19 July 2022
47. The importance of maintaining effective machine-identity security
(Guest Opinion)
... such as those experienced by SolarWinds and Kaseya, the software supply chain was leveraged as a conduit for attacks due to machine-identity and code-signing mismanagement. During the past two years, ...
Created on 11 July 2022
48. Aqua Security partners with CMD Solutions to drive growth on AWS in Australia
(Company News)
... lifecycle, from the software supply chain through to runtime monitoring and policy enforcement. The ability to integrate these functionalities seamlessly into existing CI/CD and SIEM workflows means we ...
Created on 11 July 2022
49. Businesses continue to invest digitally and plan for expansion in the next 12 months: Equinix
(Data Centres)
... most important drivers with commitments made to science-based targets. “Even as enterprises seek to navigate the waves of disruptions associated with inflation, supply chain disruptions, and unmet skills ...
Created on 08 July 2022
50. Zscaler opens data centres in Canberra and Auckland
(Security)
... a range of threats, including potential national state and supply chain attacks. "Our new data centre infrastructure will further support any new programs which the new Federal Government and Minister ...
Created on 28 June 2022
  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
  • End
  • Home
  • Latest News
  • Your IT
  • Business IT
  • IT Industry
  • NEWSLETTER
  • MAGAZINE
  • IT People
  • Government
  • RSS

Services

  • Promotional News & Content
  • Sponsored Announcements
  • Self Posting
  • JobZilla IT Jobs
  • See Newsletter
  • Our Journalists

Company

  • About
  • Contact
  • Advertising Specs
  • Advertise NOW
  • Privacy
  • Editorial Guidlines& Complaints Handling
  • Sitemap

Connect

Facebook
Twitter
Cloud Hosting by Digital Pacific