Why businesses need a strategy to combat the enemy within – Ping Identity
While strengthening your organisation’s external defences with the latest tools and technologies makes sound sense, it’s only half a battle plan.
Gartner names Trend Micro leader in endpoint protection platforms
Citrix and Palo Alto Networks team up on SD-WAN protection
SecurityScorecard launches custom security ratings feature
How the iPhone malware discovery affects Apple users – Malwarebytes
Scale Computing integrates Acronis services into HC3 platform
Fileless attacks surge as attackers look to boost ROI
Over 50% of incident response requests occur after damage complete – Kaspersky
It is often assumed that incident response is only needed in cases when damage from a cyber-attack has already occurred and there is a need for further investigation.
Five winning strategies for VMware in 2019
We look under the hood at the enterprise software vendors plans for the year.
The dark side of apps: Security threats on the rise
"Think about it, unsecured Wi-Fi, spoofing, phishing attacks, ransomware, spyware... mobile devices make for the perfect target."
Carbon Black discovers evolution of popular cryptomining campaign
Attackers could theoretically pull in an estimated $1.6 million annually by leveraging this attack model, which began about two years ago.
Southeast Asia a hotbed for phishing attacks
Kaspersky detects over 14 million phishing attempts in Southeast Asia for H1 2019.
AlgoSec announces new features to improve Cisco ACI automation and application visibility
AlgoSec A30 release delivers new automation capabilities that enable zero-touch security management across SDN, cloud and on-premise networks.
Businesses ignoring security when investing in new tech
Only a quarter of organisations are prioritising security when it comes to technology investment, according to a new report by Advanced.
IBM launches data privacy platform for hybrid multicloud environments
The IBM z15 will enable customers to manage who can access data via policy-based controls such as encryption, cloud-native deployment, instant recovery, and data-centric privacy controls.
VMware launches software-defined networking and security stack built for multi-cloud
VMware networking and security portfolio delivers more automation, compliance, visibility, and scale across the data centre, cloud, branch and edge.
Proofpoint integrates people-centric protection with Okta’s Identity Cloud
The partnership aims to bolster the security posture for organisations’ very attacked people (VAPs) by applying additional adaptive security controls.
Illusive Networks joins LogRhythm technology alliance partner program
The resulting integration will provide real-time, post-breach threat detection while enhancing and automating incident response.
Puppet launches vulnerability remediation product
With vulnerabilities and security breaches on the rise, the latest Puppet product helps IT teams find, prioritise and remediate vulnerabilities.
People just can't let go of old Windows operating systems
Consumers and businesses worldwide are hanging on to older operating systems like Windows XP and Windows 7, despite the fact that many of those operating systems are no longer supported.
Security flaw left Android phones open to SMS phishing attacks found
Check Point Research discovered the vulnerability impacts phones from Samsung, Huawei, LG, and Sony.
Soft skills increasingly important for IT career growth – SolarWinds survey
SolarWinds conducted a survey and had responses from 177 technology professionals from across the globe, including those from public and private sectors.
Gartner names Ping Identity leader in access management
The solution includes authentication and single sign-on, MFA, access security, directory, intelligent API security and data governance capabilities that work together.
European Patent Office lauds Asia's efforts to protect IP
More than half (53%) of the patent applications received in recent years have come from countries including Singapore, China, Japan, Korea, and the United States.
Proofpoint and CrowdStrike partner on endpoint protection integration
In the first technology integration, Proofpoint will check potentially malicious attachments with CrowdStrike Falcon Intel and will add new hashes to the customer’s custom intelligence.
SolarWinds announces updates to web performance monitoring products
With the improved functionalities, technology professionals managing every type of environment can monitor website availability and performance.