• Subscribe to Newsletter
  • Advertise
iTWire iTWire iTWire
  • Home
    • About iTWire
    • About iTWire - Advertising, Sponsored Posts, Editorial & Press Releases
    • About our News site
    • Advertise in Newsletter
    • Advertise on iTWire
    • Advertising Specs
    • Advertorials
    • Commswire Subscription
    • Contact CEO
    • Contact Editor
    • Current Webinars
    • Interviews
    • iTWire News Site Editor
    • Lead Generation
    • Newsletter Editor
    • Our Journalists
    • Press Releases
    • Promotional News
    • Reviews
    • See Latest Newsletter
    • Commswire Newsletter Example
    • Sponsored News
    • Webinar Promotion
    • Zoom Interviews
  • Your Tech
    • Browse News
      • Entertainment & Gaming
      • Mobility
      • Home Tech
      • Wi-Fi
      • Apps
      • Internet of Things
  • Business
    • Browse News
      • iTWire Marketing
      • Networking
      • Open Source
      • Security & Cybersecurity
      • Business Telecommunications
      • Enterprise Solutions
      • Print Solutions
      • Hardware
      • Storage & Cloud Storage
      • Business Software
      • Cloud
      • Data Analytics & Artificial Intelligence
      • Data Centres
      • MVNO
      • Managed Services
      • Accounting Software
      • Business Intelligence
  • Industry
    • Browse News
      • Deals
      • Channel News & Partnerships
      • Cloud Accounting
      • Enterprise Cloud
      • Virtualisation
      • Web Development & Front-End Development
      • Telecoms & NBN
      • Manufacturing & Logistics
      • Web Hosting
      • VoIP
      • Strategy
      • Listed Tech
      • Market
      • Application Performance
      • CRM & Contact Center Apps
  • People
    • Browse News
      • Career Coach
      • Recruitment
      • Not For Profit
      • Education & Machine Learning
      • People Moves
      • CIO Trends
      • Enterprise Staff
      • Remote Working
  • GOVT
    • BROWSE NEWS
      • Government Tech Policy
      • Technology Regulation
      • Technology Tenders
      • Local Government
  • Science
    • Browse News
      • Energy
      • Climate
      • Health
      • Biology
      • Automotive
      • Space
    • Water Resources
    • Environment
    • Mining here
  • Opinion
    • Browse
      • Apexing the Linux learning curve
      • ShrinkAge
      • The Big House
      • Fuzzy Logic - Alex Zaharov-Reutt
      • Seeking Nerdvana
      • Open Sauce - Sam Varghese
      • A Meaningful Look
      • Transit
      • Business Intelligence Blog
      • ShawThing
    • Browse
      • Stephen Withers
      • Whiskey Tango Foxtrot - David Heath
      • Linux Distillery - David M Williams
      • UNI-verse
      • Radioactive IT
      • Cornered!
      • Beerfiles
      • ICT Energy and Sustainability
      • Wired CIO - David M Williams
      • C Level
  • Reviews
    • Browse
      • Computers & Peripherals
      • Smartphones & Mobile Devices
      • Software
      • Networking
      • Books
      • Games
  • Guest Articles
    • Guest Opinion
    • Guest Reviews
    • Guest Interviews
    • Webinars & Online Events
    • Guest Research
    • Company News
  • CHANNELS
  • ITWIRE TV

Total: 105 results found.

Search for:
Search Only:
1. Macquarie Telecom achieves certification from Digital Transformation Agency
(Business Telecoms)
... Action Plan, the Redspice project, the Hardening Government IT Initiative, the Privacy Legislation Amendment, and wider plans to reform the nation’s cybersecurity and privacy regulation. Macquarie Government ...
Created on 14 December 2022
2. Varonis Launches HackerOne Vulnerability Disclosure Program
(Security)
... choice to launch a VDP is a great proactive step toward hardening attack surfaces and a signal of an increasingly security-mature organisation,” said Amanda Berger, Chief Customer Officer at HackerOne. ...
Created on 01 December 2022
3. Tambla honoured by Red Hat for Ansible automation slashing costs and increasing services
(Enterprise Solutions)
... secured. The Advent One approach is to use Red Hat Ansible to build infrastructure and set up the operating system, apply security hardening, establish and manage the desired state, identify and prepare ...
Created on 20 November 2022
4. F5 issues fixes for BIG-IP, BIG-IQ flaws discovered by Rapid7
(Security)
... a reasonable attack surface. All the flaws were discovered by Ron Bowes. It added that the presence of SELinux hardening on F5 devices was an excellent safeguard making exploitation attempts more difficult. ...
Created on 18 November 2022
5. Navigating the Security Sector’s ‘Alphabet Soup’ of Terminology
(Guest Opinion)
... code, perform system hardening, and identify workload misconfigurations. Use cases include system file integrity monitoring, application whitelisting, host-based firewalling, patching and configuration ...
Created on 15 November 2022
6. New Genetec research shows cybersecurity remains a top concern for physical security professionals worldwide
(Security)
... last year, cyber-hardening of physical security hardware and access control management were the most popular, with 40% of respondents implementing new measures targeting those capabilities. “It’s ...
Created on 28 October 2022
7. Australia an increasingly attractive traget for cybercriminals: report
(Security)
... and any proposed initiatives or changes being considered. • Hardening Australian Government IT Systems: The Government needs to be a role model in its own operations, while also improving the security ...
Created on 26 August 2022
8. Hardening physical security to protect against cyberattacks
(Guest Opinion)
GUEST OPINION: As the world has become increasingly interconnected through the move to cloud computing and Internet of Things (IoT) devices, cyber-crime has risen steadily, along with tools to combat it. ...
Created on 17 August 2022
9. Post-pandemic security concerns elevated: survey
(Security)
... admin privileges, 16% use application control, and 19% have adopted user application hardening. "Many organisations have struggled with particular aspects of the Essential Eight, such as application control," ...
Created on 10 August 2022
10. How VMware Carbon Black Workload for Amazon secures workloads
(Security)
... hardening with next-generation antivirus (NGAV) to analyse attacker behaviour patterns over time and help stop never-seen-before attacks. With enterprise threat hunting for workloads that includes behavioural ...
Created on 09 August 2022
11. What’s a CNAPP and why is it essential for security?
(Guest Opinion)
... takes a CNAPP one step beyond even the most robust shift-left protection and hardening of the environment. This is crucial since those steps, although important, won't protect organisations from zero-day ...
Created on 25 July 2022
12. Detmold Group puts cybersecurity front and centre in its modernisation journey
(Company News)
... hardening, office macro control as well as enhancing endpoint and web security. Furthermore, Sophos MTR offers much-needed peace of mind, combining malicious traffic detection with real-time threat intelligence ...
Created on 21 July 2022
13. How Bitdefender’s MDR Foundations protect MSPs from cyberattacks
(Security)
... incorporates risk assessment and hardening, prevention, endpoint detection and response (EDR), cross-endpoint threat correlation and extended detection and response (XDR) with sensors that go beyond the ...
Created on 14 July 2022
14. Barracuda boosts Australian business cybersecurity with customised security awareness training covering the Essential Eight
(Company News)
... whitelisting, patching applications, configuring Microsoft Office, application hardening, restricting administrator privileges, patching operating systems, multi-factor authentication, daily backups, and ...
Created on 06 July 2022
15. Absolute Software announces new partnerships with leading ISVs leveraging Absolute Application Persistence-as-a-Service
(Deals)
...  “Hardening our ZTEdge platform has been a top priority for Ericom, and with Absolute, we’ve found the right partnership to put our vision into motion,” said Ericom CPO John Peterson. “Adding Absolute’s ...
Created on 13 June 2022
16. Alibaba ranked the world’s third largest IaaS provider for the fourth consecutive year
(Company News)
... October 2021, has leading capabilities in container elasticity, storage, input/output (IO) performance, low latency and chip-level security hardening features. It is also equipped with the industry’s only ...
Created on 13 May 2022
17. Part 2: More tech executive commentary on Australia's 2022-23 Federal Budge
(Government Tech)
...  to hardening the security posture of Australian businesses by providing easy and affordable access to cyber care for SMBs, such a scheme will provide skilled job creation and a path to employment for tertiar ...
Created on 30 March 2022
18. Ransomware groups are driving Active Directory exploitation to unacceptable rates
(Guest Opinion)
... by using AD group policies. Once executed on the domain controller, the ransomware automatically distributes itself across the domain, disabling existing Microsoft protections along the way." Hardening ...
Created on 28 March 2022
19. ACSC calls on Australian organisations to urgently adopt an enhanced cyber security posture
(Security)
... control; Patch applications; Configure Microsoft Office macro settings; User application hardening; Restrict administrative privileges; Patch operating systems; Multi-factor ...
Created on 25 February 2022
20. Why automate those cloud apps – because hackers do
(Guest Opinion)
... are notorious for granting unnecessary permissions to users who have no business need for them. Intelligent permission analysis methods and smart hardening procedures can help to crack down on excessive ...
Created on 16 February 2022
21. MacGov hires Foster to lead defence and national security business
(People Moves)
... months as we fill a range of roles in security, cloud, and DevOps areas." Foster will lead Macquarie's expanding defence and national security activity, as well as supporting the Hardening Government ...
Created on 15 February 2022
22. Trend Micro blocked more than 94B threats in 2021
(Security)
... supply chains, cloud environments and DevOps functions as likely targets. To counter that, the company recommends enhanced risk-based patching, XDR, server hardening, zero trust, network monitoring, and ...
Created on 01 February 2022
23. The O-RAN Alliance announced the 5th release of its open source software
(5G)
...  has made important contributions to the E-release of OSC’s open software around the hardening of the RAN Intelligent Controller (RIC) platform, InfluxDB SDL integration, ODU High O1 support for the closed-loo ...
Created on 28 January 2022
24. CyberRes Galaxy helps execs understand cyber threats
(Security)
... expand. "What the industry needs is a platform where leaders, CISOs, SecOps, ITOps, and internal auditing teams can get a full view of the latest threats, as well as insightful action plans for hardening ...
Created on 12 January 2022
25. Alibaba Cloud to expand with new data centres in South Korea, Thailand
(Data Centres)
... terms of container elasticity, storage, Input/output (IO) performance, latency and chip-level security hardening features. “The self-developed Shenlong architecture is upgraded to support data intensive ...
Created on 21 October 2021
26. JMA’S 5G XRAN in US Department of Defence
(5G)
... is getting the benefit of many years of development and field hardening. A 100% software solution that operates on a commercial-off-the-shelf (COTS) server, XRAN replaces racks of expensive custom hardware, ...
Created on 23 June 2021
27. Jamf bolsters security capabilities
(Security)
... and compliance checks for macOS. It monitors endpoint security settings against common OS hardening benchmarks, and maintains visibility of critical network, process, system, and user activity . Jamf ...
Created on 17 June 2021
28. ASD approves use of recent Samsung Galaxy smartphones in Aust Govt agencies
(Government Tech)
... of Microsoft Office macro settings, user application hardening, restricting administrative privileges, and multi-factor authentication. Samsung reminds us that it "provides a range of customisable and ...
Created on 24 February 2021
29. HPE Spaceborne Computer-2 heading for space station
(Hardware)
... of the famed NASA mathematician. The original Spaceborne Computer was launched in 2017 as a proof of concept for using commercial-off-the-shelf servers with software-based hardening on the ISS, with ...
Created on 12 February 2021
30. FireEye: Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452
(Guest Research)
... that UNC2452 and other threat actors have used to move laterally from on-premises networks to the Microsoft 365 cloud have been detailed in our white paper, Remediation and Hardening Strategies for Microsoft ...
Created on 23 January 2021
31. FireEye releases update on attacks, offers Azure auditing script
(Security)
Cyber security firm FireEye has released new guidance for those who have been compromised by the SolarWinds attackers to harden their environments and remediate areas where attacks are feared. The ...
Created on 20 January 2021
32. What’s the risk of being unsupported?
(Guest Opinion)
... incident, regardless of whether they paid the ransom. These additional costs include rebuilding and hardening networks, implementing additional IT security controls, time and money spent on data recovery ...
Created on 09 December 2020
33. What’s the risk of being unsupported?
(Sponsored Announcements)
... incident, regardless of whether they paid the ransom. These additional costs include rebuilding and hardening networks, implementing additional IT security controls, time and money spent on data recovery ...
Created on 09 December 2020
34. What’s the risk of being unsupported?
(Security)
... incident, regardless of whether they paid the ransom. These additional costs include rebuilding and hardening networks, implementing additional IT security controls, time and money spent on data recovery ...
Created on 09 December 2020
35. New OT cyber security specialist to protect Australian business interests
(Sponsored Announcements)
... to security hardening or testing,” he said. Many organisations also avoided assessing the security of their industrial control systems because of the impact it could have on the business in terms of ...
Created on 23 September 2020
36. New OT cyber security specialist to protect Australian business interests
(Guest Research)
... to security hardening or testing,” he said. Guest WriterMany organisations also avoided assessing the security of their industrial control systems because of the impact it could have on the business ...
Created on 23 September 2020
37. New OT cyber security specialist to protect Australian business interests
(Security)
... to security hardening or testing,” he said. Many organisations also avoided assessing the security of their industrial control systems because of the impact it could have on the business in terms of ...
Created on 23 September 2020
38. Beware - excessive permissions are the #1 cloud threat
(Sponsored Announcements)
... the permission they actually use. # Harden security posture: The best way of stopping a data breach is preventing it before it ever occurs. Therefore, hardening your cloud security posture and eliminating ...
Created on 03 September 2020
39. Beware - excessive permissions are the #1 cloud threat
(Cloud)
... the permission they actually use. # Harden security posture: The best way of stopping a data breach is preventing it before it ever occurs. Therefore, hardening your cloud security posture and eliminating ...
Created on 03 September 2020
40. How to spot a phishing attack … before it’s too late
(Guest Opinion)
... technique works and what they should do in response. It’s termed ‘hardening the human attack surface’. A first step is to explain to users how phishing content differs from legitimate email. They need ...
Created on 11 August 2020
41. NEW APAC PARTNERSHIP FOR RUNECAST & ANATAS
(Sponsored Announcements)
... information security management, Runecast Analyzer answers the challenge by monitoring and reporting on configuration issues, providing automated compliance checks against VMware and AWS security hardening ...
Created on 14 July 2020
42. NEW APAC PARTNERSHIP FOR RUNECAST & ANATAS
(Resellers)
... information security management, Runecast Analyzer answers the challenge by monitoring and reporting on configuration issues, providing automated compliance checks against VMware and AWS security hardening ...
Created on 14 July 2020
43. IT ‘savvy crooks’ continue to fuel growing cyber threat menace
(Sponsored Announcements)
... including hardening their endpoints, upgrading their perimeter defence, and upgrading their endpoint security controls. We also reviewed and improved the way their financial department was authorising ...
Created on 14 February 2020
44. IT ‘savvy crooks’ continue to fuel growing cyber threat menace
(Security)
... including hardening their endpoints, upgrading their perimeter defence, and upgrading their endpoint security controls. We also reviewed and improved the way their financial department was authorising ...
Created on 14 February 2020
45. Linux kernel patch maker's appeal against Perens' legal costs thrown ou
(Open Source)
Open source advocate Bruce Perens has prevailed in a legal stoush with Open Source Security, the company that offers a patch known as Grsecurity for the Linux kernel, with a court ratifying that OSS must ...
Created on 07 February 2020
46. Western European telcos winning the European 5G race: analyst
(Business Telecommunications)
... 5G era thus far”, significant hardening of standards related to both radio and core innovations took place in 2018. “After completing the first 5G standard in December 2017 for ‘non-standalone’ 5G new ...
Created on 12 June 2019
47. Nutanix seals deal to support Laing O’Rourke’s digital strategy, technology development
(Deals)
... with other technology initiatives including using big data to test the hardening of newly-laid road surfaces. Nutanix says it is supporting Laing O’Rourke to further develop similar technologies by providing ...
Created on 24 April 2019
48. Trend Micro shows way to hack RF-controlled industrial machines
(Security)
... online) and ensuring that some form of configurable pairing is available; Periodically changing the fixed (ID) code, if possible; Keeping the programming computer off the network or hardening its security ...
Created on 16 January 2019
49. Torvalds breaks with past, apologises for abrasive behaviour
(Open Source)
... on how to understand people’s emotions and respond appropriately." At least one person greeted the statement with scepticism. Brad Spengler, who runs a firm named Grsecurity that puts out a hardening ...
Created on 17 September 2018
50. Red Hat dev questions why older Linux kernels are patched quietly
(Security)
... Kroah-Hartman about a specific patch that fixed a flaw that could lead to a denial of service. iTWire learnt of the issue due to a tweet from Grsecurity, a company that creates a patch for hardening ...
Created on 10 September 2018
  • Start
  • Prev
  • 1
  • 2
  • 3
  • Next
  • End
  • Home
  • Latest News
  • Your IT
  • Business IT
  • IT Industry
  • NEWSLETTER
  • MAGAZINE
  • IT People
  • Government
  • RSS

Services

  • Promotional News & Content
  • Sponsored Announcements
  • Self Posting
  • JobZilla IT Jobs
  • See Newsletter
  • Our Journalists

Company

  • About
  • Contact
  • Advertising Specs
  • Advertise NOW
  • Privacy
  • Editorial Guidlines& Complaints Handling
  • Sitemap

Connect

Facebook
Twitter
Cloud Hosting by Digital Pacific