Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Deakin Uni scores double win with Exabeam partnership
Australia’s Deakin University is partnering with SIEM security company Exabeam in an effort to boost the university’s cybersecurity degree program and strengthen its SIEM capabilities.
20 May 2019
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
16 May 2019
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
20 Mar 2019
How business leaders must prioritise cyber risk - Palo Alto Networks
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
13 Mar 2019
Flashpoint: Contextual data key to effective security
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.
04 Feb 2019
LogRhythm: Foster a culture of cybersecurity awareness
According to the Australian Cyber Security Centre, the danger to local organisations has never been greater.
01 Feb 2019
Achieving cyber resilience in the telco industry - Accenture
Whether hackers are motivated by greed, or a curiosity to assess a telco’s weaknesses; the interconnected nature of the industry places it in a position of increased threat
21 Jan 2019
Implementing shared security models in the cloud
Developers aren’t usually aware of every control that should be implemented to ensure security in cloud environments.
08 Jan 2019
How protecting critical infrastructure starts with securing social media
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
01 Jan 2019
Govt announces cybersecurity grants for SMBs
Over the next two years, eligible small businesses can apply for individual grants of up to $2,100.
03 Dec 2018
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
14 Nov 2018
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
09 Nov 2018
Don’t let your network outgrow your IT team
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."
08 Nov 2018
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
07 Nov 2018
Securing your cloud data: Point solutions vs single pane of glass
Organisations that can use fewer security products that individually offer more capability are likely to have a lower total cost of ownership.
05 Nov 2018
LogRhythm reports higher-than-anticipated SOAR adoption rate
The company’s embedded security orchestration, automation and response (SOAR) capabilities are embedded in its security information and event management offering.
01 Nov 2018
More OT devices added to Tenable's industrial security offering
Most operational technology systems run in heterogeneous environments, with devices from numerous industrial vendors, often relying on unique, proprietary protocols.
19 Oct 2018
GDPR compliance: Looking beyond the hype
With contrasting advice coming from all angles, the line between GDPR fact and fiction has become blurred.
17 Oct 2018
Exclusive: Cybersecurity in the API economy
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
15 Oct 2018
Trend Micro’s four pillars of cybersecurity strategy
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
11 Oct 2018
Industrial control systems: How to approach OT cybersecurity
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.
09 Oct 2018
Carbon Black: Is your cyber panic room ready?
Cyber spies and cyber criminals alike are setting our networks on fire.
05 Oct 2018
Cybersecurity for dummies: How to minimise the risk of data loss
"The value of the data you cannot touch is more than the price of the device you can hold."
24 Sep 2018
Exclusive: Aura on designing a secure IT infrastructure
Being secure by design is an ongoing process and not one that is forgotten as soon as a project is complete.
17 Sep 2018