Soft skills increasingly important for IT career growth – SolarWinds survey
SolarWinds conducted a survey and had responses from 177 technology professionals from across the globe, including those from public and private sectors.
More than half of personal data breaches caused by human error
Sophos report reveals barriers to cybersecurity preparedness in APJ
CrowdStrike establishes early-stage investment fund with Accel
Businesses ignoring security when investing in new tech
European Patent Office lauds Asia's efforts to protect IP
Proofpoint and CrowdStrike partner on endpoint protection integration
Sophos named Magic Quadrant Leader, changes up APAC channel staff
This is the 11th time in a row Sophos has been positioned as Leader and shaken up its APAC and A/NZ channel execs.
Security flaw left Android phones open to SMS phishing attacks found
Check Point Research discovered the vulnerability impacts phones from Samsung, Huawei, LG, and Sony.
Apple issues clarification on extent of iOS malware infection
The attack affected fewer than a dozen websites that focus on content related to the Uighur community.
Over 50% of incident response requests occur after damage complete – Kaspersky
It is often assumed that incident response is only needed in cases when damage from a cyber-attack has already occurred and there is a need for further investigation.
Fileless attacks surge as attackers look to boost ROI
Fileless attacks have skyrocketed 265% this year compared to the first half of 2018, and there’s no sign that they will slow down.
SecurityScorecard launches custom security ratings feature
Custom Scorecard allows enterprise leaders to better isolate and focus on cybersecurity risk issues by business units and/or subsidiaries.
Scale Computing integrates Acronis services into HC3 platform
The Scale Computing HC3 platform will now include Acronis Backup, which will deliver data protection, disaster recovery, and threat mitigation.
The dark side of apps: Security threats on the rise
"Think about it, unsecured Wi-Fi, spoofing, phishing attacks, ransomware, spyware... mobile devices make for the perfect target."
Gartner names Ping Identity leader in access management
The solution includes authentication and single sign-on, MFA, access security, directory, intelligent API security and data governance capabilities that work together.
SolarWinds announces updates to web performance monitoring products
With the improved functionalities, technology professionals managing every type of environment can monitor website availability and performance.
Trustwave platform brings more visibility and control cloud security
The platform aims to give internal security teams deep visibility, technologies and the security expertise necessary for protecting assets and eradicating threats as they arise.
Ransomware making a comeback, McAfee report finds
McAfee Labs saw an average of 504 new threats per minute in Q1 and a resurgence of ransomware along with changes in campaign execution and code.
Blockchain revenues to near US$10B despite 2018 crypto winter
This year blockchain is starting to find its feet as innovators find the use-cases that suit the specific areas in which it can provide value.
Carbon Black discovers evolution of popular cryptomining campaign
Attackers could theoretically pull in an estimated $1.6 million annually by leveraging this attack model, which began about two years ago.
VMware launches software-defined networking and security stack built for multi-cloud
VMware networking and security portfolio delivers more automation, compliance, visibility, and scale across the data centre, cloud, branch and edge.
Gartner, Forrester name Retarus for Email Security
The information logistics firm was listed as one of the twelve most important providers of email security services in the world by Forrester Research.
Gartner names Trend Micro leader in endpoint protection platforms
The endpoint is increasingly the frontline in the war against cyber-threats and IT teams are overwhelmed by the volume of alerts they must manage.
How the iPhone malware discovery affects Apple users – Malwarebytes
The malware implant has been patched, but iPhone users should ensure they’re running on the latest version of iOS (12.1.4) to leverage the security patches.
Five ways attackers can create havoc in smart homes
Attack motives include burglaries, cyber stalking, botnet creation, cryptocurrency mining hubs, theft of personal information or financial information.