Lateral phishing: The latest in email account takeover
"One of the most striking aspects of this emerging attack is the scale of potential victims that the attackers target."
RSA responds to increasing A/NZ regulations with new updates
Global banks fail to keep up with application security
Protecting organisations from insider threats - Bitglass
Barracuda improves Azure connectivity for Office 365 security
Who is really responsible for cloud security?
Overcoming deepfakes with deep learning
Whitepaper: Setting up syslog-ng storage in Elasticsearch
Elasticsearch, an easy-to-scale and easy-to-search NoSQL data store, has been gaining momentum as the ultimate destination for log messages in recent years.
Report: Using UEBA to increase security analytics effectiveness
To facilitate more effective cybersecurity, businesses need to accommodate larger data sets with more advanced analysis of the data.
How to stop your data from getting hijacked - SolarWinds
Organisations often struggle to avoid man-in-the-middle attacks because hackers target infrastructure the organisation has almost no control over.
10 times malware proved that MacOS isn't bulletproof
Mac users need to come to terms with the fact that their devices are not immune from attack.
Whitepaper: Using syslog-ng’s pattern database to analyse log messages
Log messages can be used to detect security incidents, operational problems, policy violations, and are useful in auditing and forensics situations.
Enterprise at tipping point, says Symantec
Enterprises are struggling to keep up with the rapid expasion of cloud within their business.
Cybersecurity: Starting with the human factor
In a recent report by Dell EMC, it was discovered that data-loss incidents cost Singapore organisations an average of US$1.4 million over 12 months.
Druva acquires hybrid cloud data protection firm
The acquisition will enable Druva to provide customers the ability to keep data readily available on-site through SaaS-based business continuity, short recovery windows, and greater workload mobility.
92% of businesses experience identity challenges - LastPass
Data from the report reveals IT professionals overwhelmingly (82%) agree that poor identity practices have exposed their business to risks.
One-size-fits-all not enough to secure IoT
"The growing trend for greater connectivity puts everyday objects at risk of exploitation."
Financial institutions' websites most frequently attacked – report
Positive Technologies found that the majority of all web attacks in 2018 targeted sites of financial institutions, transportation companies, hospitality and entertainment companies.
Cybersecurity market increasingly competitive as public cloud segment grows
Cybersecurity solutions for public cloud and ‘as a service’ offerings are continuing to grow, however traditional hardware and software deployments still dominate the market.
Financial organisations plagued by spear phishing attacks
Finance department employees are most heavily targeted by these attacks, because they are most likely to deal with banks and other financial institutions.
IoT home connectivity on the up, as are cybersecurity threats
“This data helps us shed light on the global emergence of IoT and types of the security problems present in the devices real users own.”
Using Splunk in conjunction with syslog-ng for log management
Collecting and centralizing log messages from network devices such as routers is one of the most common deployments of syslog-ng with Splunk.
Check Point releases report on public cloud security challenges
Unauthorised access, insecure interfaces, misconfigurations and account hijacking named as the biggest vulnerabilities in the public cloud.
NTT fuses 28 tech companies into new provider
The merger will include some of NTT’s biggest businesses, including NTT Communications, NTT Security, and Dimension Data.
Whitepaper: Why accurate log processing is key to effective SIEM
SIEMs form the core of many enterprises’ IT security strategies, but they can be expensive to deploy and maintain.
Marriott, British Airways fines highlight critical need for security investment
The last week has brought heavy fines against the likes of global hotel chain Marriott and airline British Airways, casting a harsh spotlight on the price of cyber attacks.
Cyber threats: Legacy systems aren't always the culprit
There is a common misconception that product security is the only way to mitigate vulnerabilities and threats.
Tesla's suit against ex-employee a strong case for IP security
“There was no need for this employee to be using their own iCloud for data storage even if the original intent was non-malicious."
Report: Why vulnerability assessment is the first step in security strategy
Tenable’s latest research examines real-world vulnerability assessment practices at 2,100 organisations to see how they’re approaching cyber hygiene.
Whitepaper: Measuring SIEM’s ability to create actionable defence
Many organisations are struggling to keep pace with the speed in which hackers are attacking their system.
BlackBerry launches new threat hunting solution
CylanceGUARD is a subscription-based offering that validates, triages, analyses, prioritises, and automates analyst and incident engagement.
HCL Technologies closes acquisition of IBM products
Company launches HCL Software business unit to operate the enterprise software offerings.