• Subscribe to Newsletter
  • Advertise
iTWire iTWire iTWire
  • Home
    • About iTWire
    • About iTWire - Advertising, Sponsored Posts, Editorial & Press Releases
    • About our News site
    • Advertise in Newsletter
    • Advertise on iTWire
    • Advertising Specs
    • Advertorials
    • Commswire Subscription
    • Contact CEO
    • Contact Editor
    • Current Webinars
    • Interviews
    • iTWire News Site Editor
    • Lead Generation
    • Newsletter Editor
    • Our Journalists
    • Press Releases
    • Promotional News
    • Reviews
    • See Latest Newsletter
    • Commswire Newsletter Example
    • Sponsored News
    • Webinar Promotion
    • Zoom Interviews
  • Your Tech
    • Browse News
      • Entertainment & Gaming
      • Mobility
      • Home Tech
      • Wi-Fi
      • Apps
      • Internet of Things
  • Business
    • Browse News
      • iTWire Marketing
      • Networking
      • Open Source
      • Security & Cybersecurity
      • Business Telecommunications
      • Enterprise Solutions
      • Print Solutions
      • Hardware
      • Storage & Cloud Storage
      • Business Software
      • Cloud
      • Data Analytics & Artificial Intelligence
      • Data Centres
      • MVNO
      • Managed Services
      • Accounting Software
      • Business Intelligence
  • Industry
    • Browse News
      • Deals
      • Channel News & Partnerships
      • Cloud Accounting
      • Enterprise Cloud
      • Virtualisation
      • Web Development & Front-End Development
      • Telecoms & NBN
      • Manufacturing & Logistics
      • Web Hosting
      • VoIP
      • Strategy
      • Listed Tech
      • Market
      • Application Performance
      • CRM & Contact Center Apps
  • People
    • Browse News
      • Career Coach
      • Recruitment
      • Not For Profit
      • Education & Machine Learning
      • People Moves
      • CIO Trends
      • Enterprise Staff
      • Remote Working
  • GOVT
    • BROWSE NEWS
      • Government Tech Policy
      • Technology Regulation
      • Technology Tenders
      • Local Government
  • Science
    • Browse News
      • Energy
      • Climate
      • Health
      • Biology
      • Automotive
      • Space
    • Water Resources
    • Environment
    • Mining here
  • Opinion
    • Browse
      • Apexing the Linux learning curve
      • ShrinkAge
      • The Big House
      • Fuzzy Logic - Alex Zaharov-Reutt
      • Seeking Nerdvana
      • Open Sauce - Sam Varghese
      • A Meaningful Look
      • Transit
      • Business Intelligence Blog
      • ShawThing
    • Browse
      • Stephen Withers
      • Whiskey Tango Foxtrot - David Heath
      • Linux Distillery - David M Williams
      • UNI-verse
      • Radioactive IT
      • Cornered!
      • Beerfiles
      • ICT Energy and Sustainability
      • Wired CIO - David M Williams
      • C Level
  • Reviews
    • Browse
      • Computers & Peripherals
      • Smartphones & Mobile Devices
      • Software
      • Networking
      • Books
      • Games
  • Guest Articles
    • Guest Opinion
    • Guest Reviews
    • Guest Interviews
    • Webinars & Online Events
    • Guest Research
    • Company News
  • CHANNELS
  • ITWIRE TV

Total: 289 results found.

Search for:
Search Only:
1. Australia is well set up to be a leader in IT/OT convergence
(Guest Opinion)
... their defences may be lowered during the convergence process, leaving them vulnerable to attacks while actual convergence work is underway. Additionally, cultural differences in approach can leave converged ...
Created on 23 January 2023
2. Ok boomer - Palo Alto Networks research finds Baby Boomers better at password reuse than Gen Z
(Security)
With a string of high-profile cyber attacks on Australian businesses in recent months, chances are high that it will happen again. Palo Alto Networks research found cyber security awareness still needs ...
Created on 19 December 2022
3. DigiCert Releases Cybersecurity Predictions for 2023 and Beyond
(Guest Research)
... Supply Chain Attacks Will Make 2023 the Year of the SBOM — An SBOM is a list of every software component that comprises an application and includes every library in the application’s code, as well as services, ...
Created on 09 December 2022
4. iTWireTV INTERVIEW: CyberArk's Regional Director ANZ, Thomas Fikentscher, identifies the impact of digital change - and cybersecurity
(Guest Interviews)
Identities, resources, assets, data, devices, code, cloud, companies, APIs, apps, partners, people... there are so many factors at play in companies today, so many attack vectors and surfaces, so much ...
Created on 29 November 2022
5. VIDEO INTERVIEW: CyberArk's Regional Director ANZ, Thomas Fikentscher, identifies the impact of digital change - and cybersecurity
(Security)
Identities, resources, assets, data, devices, code, cloud, companies, APIs, apps, partners, people... there are so many factors at play in companies today, so many attack vectors and surfaces, so much ...
Created on 29 November 2022
6. Australians Will Have The Right to Be Forgotten in 2023
(Guest Opinion)
... will deploy increased cybersecurity measures: Recent high-profile cyberattacks have highlighted the need for organisations to have comprehensive and robust IT security measures in place. One that will ...
Created on 25 November 2022
7. Aqua Security combats rising zero-day attacks with eBPF Lightning Enforcer
(Company News)
COMPANY NEWS: Aqua Security, the leading pure-play cloud native security provider, today announced its new Lightning Enforcer to stop zero-day attacks and shield critical vulnerabilities in production ...
Created on 16 November 2022
8. BeyondTrust releases top 10 cybersecurity predictions for 2023 and beyond
(Guest Opinion)
... an attack vector all in itself. Prediction 3: The foundation of multi-factor authentication (MFA) invincibility fails. Expect a new round of attack vectors that target and successfully bypass multi-factor ...
Created on 03 November 2022
9. Nozomi Networks-sponsored SANS survey finds security defences are getting stronger as cyber threats to OT environments remain high
(Guest Research)
... more than a third (35%) don't know whether their organisations had been compromised and attacks on engineering workstations doubled in the last 12 months. "In the last year, Nozomi Networks researchers ...
Created on 02 November 2022
10. Attackers stay a step ahead of Microsoft in macro attacks
(Security)
Microsoft's decision to block macros originating from the Internet by default has led to threat actors resorting to disk image and archive-based attacks, the global security firm Sophos claims. In a ...
Created on 18 October 2022
11. OpenText teams with NetScaler to deliver advanced web application protection
(Market)
... the latest security threats.  NetScaler ADC and WAF protect customers from known and zero-day application attacks with a comprehensive security solution for web applications and Application Programming ...
Created on 13 October 2022
12. Data from old attack on Optus parent Singtel surfaces on Web forum
(Security)
Data stolen from Singapore's multinational telecommunications conglomerate Singtel on 20 January last year, during an attack through a file-sharing system from Accellion that was close to end-of-life at ...
Created on 10 October 2022
13. Why small and midsized businesses need XDR security
(Guest Opinion)
GUEST OPINION: A 2022 survey among CISOs reveals that small and midsized businesses (SMBs) believe they are more at risk of cyberattacks than their enterprise counterparts. Around 6 in 10 SMB CISOs who ...
Created on 04 October 2022
14. Fortinet report notes ransomware variants doubled in the last six months
(Security)
... Landscape Report. Ransomware variant growth shows evolution of crime ecosystems Ransomware remains a top threat and cyber adversaries continue to invest significant resources into new attack techniques, ...
Created on 22 August 2022
15. Global ransomware survey reveals one in three organisations see malicious insiders as a route for ransomware
(Guest Research)
... suffered a ransomware attack enabled by a malicious insider, a threat seen as commonly as the accidental insider (35%). Furthermore, 59% of organisations believe ransomware has worsened in the last three ...
Created on 19 August 2022
16. Ransomware attacks on the rise: report
(Security)
There has been a significant increase in global ransomware attacks in the second quarter of 2022, with attacks up 24% from the three months of the first quarter this year. The report on a global rise ...
Created on 11 August 2022
17. Claroty launches new cybersecurity platform for cyber and operational resilience
(Company News)
... deployed full of vulnerabilities. The result has been a substantial increase in the attack surface for hackers and bad actors of all kinds, and the CPS that underpin most of this critical infrastructure ...
Created on 10 August 2022
18. Rolling out SD-WAN? Here’s how to quantify ROI & business value
(Networking)
... dynamic payloads, threats, and attack vectors included. Whether you are conducting proof of concepts, planning, validating designs, or continuously testing into production, test traffic profiles should ...
Created on 09 August 2022
19. Rolling out SD-WAN? Here’s how to quantify ROI & business value
(Guest Opinion)
... dynamic payloads, threats, and attack vectors included. Whether you are conducting proof of concepts, planning, validating designs, or continuously testing into production, test traffic profiles should ...
Created on 02 August 2022
20. Ransomware attacks enabled by malicious insiders warns Gigamon
(Security)
Nearly one-third of organisations have suffered a ransomware attack enabled by a malicious insider, a threat seen as commonly as the accidental insider (35%), according to a new report from cloud visibility ...
Created on 28 July 2022
21. Australian businesses need to stop neglecting supply chain security risks
(Guest Opinion)
... cyber attack surface. According to the US Cybersecurity and Infrastructure Security Agency (CISA), "a software supply chain attack occurs when a cyber threat actor infiltrates a software vendor's network ...
Created on 19 July 2022
22. The importance of maintaining effective machine-identity security
(Guest Opinion)
GUEST OPINION: As cybercriminals hunt for new and more sophisticated ways to mount attacks, many are paying close attention to the role played by machine identities. In some high-profile security incidents, ...
Created on 11 July 2022
23. Ukraine's State Service of Special Communications and Information Protection selects Radware for cloud and application security service
(Company News)
... attacks. Ukraine's SSSCIP is tasked with protecting state information resources. In parallel with Russia's physical invasion of Ukraine, the world was exposed to modern warfare. As Russian troops entered ...
Created on 27 June 2022
24. The top challenges facing MSPs in a post-pandemic environment
(Guest Opinion)
... 42% of MSPs pointed to the integration of tools. This was followed by the patching and updating of tools (40%), complying with regulations (36%), and coping with the vast number of potential attack vectors ...
Created on 17 June 2022
25. Q1 DDoS and application attack activity reveals surprise result
(Guest Research)
... faced tried-and-true attack vectors. These attacks were largely driven by a threat landscape turbocharged by geopolitical instability, hacktivists, nation-state threat actors, and a focus on exploiting ...
Created on 16 June 2022
26. Mandiant Digital Risk Protection delivers extensive visibility into vulnerabilities, empowering organisations to proactively defend against emerging threats
(Company News)
... of an organisation’s global attack surface and business-impacting activity on the deep and dark web. The solution is comprised of Mandiant offerings and is designed to allow security leaders to proactively ...
Created on 07 June 2022
27. Mandiant and Interos join forces to advance supply chain cyber risk management
(Company News)
... cyber attacks and other threats to their operational resilience. The collaborative partnership is designed to bring to market new intelligence based on insights gleaned from the Interos Resilience Lab, ...
Created on 03 June 2022
28. Elevation of privilege led Microsoft vulnerabilities in 2021: BeyondTrust
(Security)
... risk of privileged attack vectors caused by cloud deployments, the removal of admin rights remains a critical step to reduce an organisation's risk surface. This can be achieved by adopting a least privilege ...
Created on 26 May 2022
29. Why MSPs must enhance their security offerings to remain relevant to their clients
(Guest Opinion)
...  While most attacks still originate via email, the traditional method of centrally managed security via firewalls and email filters is no longer sufficient. Managed endpoint protection is needed to ensure ...
Created on 18 May 2022
30. Nokia opens 5G security testing lab dedicated to cyber security
(5G)
... and scale of information networks evolving as well as the scale of security threats. However, this scale left vulnerabilities, with Nokia warning that there are now more avenues of attack open to hackers, ...
Created on 13 May 2022
31. Musk says Twitter block of Hunter Biden story was wrong
(Technology Regulation)
... Twitter under Elon." Twitter's policy on posting hacked materials was questioned in January this year when a group of attackers who claimed to have hacked the Belarus Railway posted proof of their exploit ...
Created on 27 April 2022
32. Top eight DDoS attacks that organisations must avoid
(Guest Opinion)
GUEST OPINION: Malware perils lurk in all directions with DDoS attacks high on the danger list. According to a recent company report, the number of DDoS attacks increased by 37% while DDoS attack volumes ...
Created on 21 April 2022
33. Over 100 patches issued by Microsoft for April; two zero-days, one exploited
(Security)
... vulnerability that allowed running of code remotely. This flaw "received a CVSSv3 score of 9.8 and a rating of 'Exploitation More Likely', Tenable said. "An unauthenticated, remote attacker could exploit ...
Created on 13 April 2022
34. WatchGuard accused of delaying flaw details, company contests report
(Security)
American security company WatchGuard has been accused of withholding full details of a remotely exploitable vulnerability in its firewall devices until news broke that the flaw was being exploited by attackers ...
Created on 08 April 2022
35. Lack of cybersecurity awareness in Asia Pacific and Japan still persists: Sophos survey
(Business IT)
There is a lack of boardroom awareness of cybersecurity, and a broad assumption from executives that their company will never get attacked, despite rising ransomware incidences, impact, and cost, according ...
Created on 05 April 2022
36. The sky is not falling yet. But Chris Krebs says it may still happen
(Open Sauce)
... defence: "At least, not yet." Yes, doomsday is still around the corner, just waiting for the traffic light to turn green. He cites the attack on satellite broadband provider Viasat that disrupted its ...
Created on 21 March 2022
37. German call for replacement of Kaspersky A-V dismissed as 'political
(Security)
... Germany and this was "associated with a significant risk of a successful IT attack with far-reaching consequences". In a statement issued on Wednesday, Kaspersky said: "We believe this decision is not ...
Created on 16 March 2022
38. Web application attacks up 88%: Radware
(Security)
... denial-of-service attacks, which rose 37%. The most common types of web application attacks were broken access controls and injection attacks, which together represented more than 75% of the total. ...
Created on 11 March 2022
39. Trellix releases first advanced threat research report, shows Log4j reach, ransomware activity, and more
(Guest Research)
... was identified and disclosed responsibly to Apache on November 24, which affected nearly all Log4j versions from 2.0-beta9 through 2.15.0 and allowed an attacker to execute arbitrary code. The vulnerability ...
Created on 16 February 2022
40. Why automate those cloud apps – because hackers do
(Guest Opinion)
... manner, so many users end up with excessive permissions for which they have no business need. Should any of those credentials fall into the wrong hands, attackers will have far-reaching access to sensitive ...
Created on 16 February 2022
41. Trellix releases first advanced threat research report, shows Log4j reach, ransomware activity, and more
(Security)
... was identified and disclosed responsibly to Apache on November 24, which affected nearly all Log4j versions from 2.0-beta9 through 2.15.0 and allowed an attacker to execute arbitrary code. The vulnerability ...
Created on 16 February 2022
42. Twitter appears to turn blind eye to hacked materials being posted
(Security)
A group of attackers who claimed to have hacked the Belarus Railway have posted proof of their exploit on Twitter in what appears to be a violation of the social media site's policies. The group, Belarusian ...
Created on 27 January 2022
43. Check Point Research details key attacks in its 2022 Security Report
(Security)
From the SolarWinds attacks throughout last year to the influx of Apache Log4j vulnerability exploitations, the 2022 Security Report conducted by Check Point Research reveals the key attack vectors and ...
Created on 24 January 2022
44. Why cybercrime will continue to flourish in 2022
(Guest Opinion)
... even more challenges for organisations in keeping the wide attack surfaces under control. The report reveals that approximately one-third of respondents anticipate that their organisation’s most significant ...
Created on 11 January 2022
45. Why responsibility for ransomware sits at the top
(Security)
GUEST OPINION by Walter Manyati, Director ANZ for Qualys: As the threat of ransomware attacks continues to escalate, the crippling of high-profile organisations frequently shines the spotlight on this ...
Created on 05 December 2021
46. Why responsibility for ransomware sits at the top
(Guest Opinion)
GUEST OPINION by Walter Manyati, Director ANZ for Qualys: As the threat of ransomware attacks continues to escalate, the crippling of high-profile organisations frequently shines the spotlight on this ...
Created on 05 December 2021
47. Samsung explains how it protects Samsung smartphones from cyberattacks
(Home Tech)
... phones and their security has never been more important or relevant. Samsung has shared an article, detailing how it protects people using Samsung smartphones from cyberattacks, which discusses the ...
Created on 03 December 2021
48. Musings on the OWASP Top 10
(Security)
This year's OWASP Top 10 underwent some significant restructuring. A few vendors offered their thoughts. The recently released OWASP Top 10 - a summary of the primary attack vectors used by ne'er-do-wells ...
Created on 29 November 2021
49. Govt promises new rules to force online firms to unmask trolls
(Technology Regulation)
... these faceless attacks in a school, at home, in the office, or on the street. And we must not stand for it online, on our devices and in our homes. “We cannot allow social media platforms to provide ...
Created on 29 November 2021
50. Industry’s first and most comprehensive research study on mid-market sector cyber security reveals 490% increase in likelihood of breach by end of 2021
(Guest Research)
... and 1,500 employees, to defend against an expanding array of cyber attacks. Pandemic-induced digital transformation, including remote work, proliferation of devices, and increased cloud application usage, ...
Created on 18 November 2021
  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
  • End
  • Home
  • Latest News
  • Your IT
  • Business IT
  • IT Industry
  • NEWSLETTER
  • MAGAZINE
  • IT People
  • Government
  • RSS

Services

  • Promotional News & Content
  • Sponsored Announcements
  • Self Posting
  • JobZilla IT Jobs
  • See Newsletter
  • Our Journalists

Company

  • About
  • Contact
  • Advertising Specs
  • Advertise NOW
  • Privacy
  • Editorial Guidlines& Complaints Handling
  • Sitemap

Connect

Facebook
Twitter
Cloud Hosting by Digital Pacific