Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Keyfactor and Thales announce integration to fight code signing cyber-attacks
Keyfactor Code Assure aims to deliver secure code signing to software vendors, mobile app developers, enterprise IT organisations, and manufacturers of IoT devices.
Enterprise IoT ecosystem extends beyond corporate devices - Zscaler
The most commonly detected IoT device categories across the Zscaler cloud were IP cameras, smart watches, printers, smart TVs, among others.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.
Kemp: Three common IoT security pitfalls
Research shows that IoT is disrupting markets and IT organisations worldwide, changing economics and agility in many markets.
Aruba announces automated security and wireless solutions
New AI-powered ClearPass Device Insight and expanded Wi-Fi 6 portfolio extend increases Aruba’s capabilities in security, connectivity and analytics.
Hands-on review: Trend Micro’s Home Network Security protects IoT devices easily
These access points may seem trivial, but any device connected to the internet now has the potential to be hacked.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
Aruba announces new automated IoT security solutions
When addressing their IoT strategies, organisations globally are faced with new security and connectivity challenges.
Aussies too lax about IoT security - McAfee
Aussie consumers are at a loss when it comes to securing the increasing number of connected devices in their homes and are often opting to take no action at all.
Cradlepoint debunks common connectivity and security myths
Many misconceptions have arisen, causing businesses to fear adopting new technologies.
New threats on the block: Formjacking, IoT, LotL attacks
Symantec's report provides an overview of the threat landscape, including insights into global threat activity, cyber criminal trends, and motivations for attackers.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Extreme Networks launches IoT security solution
IoT devices are typically deployed in a flat or unsegmented network so that if breached, the attacker can gain access to sensitive areas of the network.
Gemalto: A look at what’s in store for IoT security
Three predominant security tools emerged as the top methods Australian organisations are using to secure their IoT data/services/devices.
IoT: Productivity boost or Pandora’s Box of security issues?
Organisations have begun using IoT to track assets, improve efficiency, boost customer service and gain greater insight into their operations.
Cost keeping Kiwi companies from making the most of IoT
"To move past the barriers inhibiting production scale IoT, organisations have to solve the broader security and upgrade issues."
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
CUJO AI and Cylance partner to secure connected homes
63% of providers still use DNS blacklisting for end-user protection, and 45% do not feel confident they are ready to manage internet of things (IoT) security.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
Security cameras – a latent botnet network?
In a comparison of 16 indoor and outdoor IP surveillance cameras, researchers found only one well-protected device.
Connected humans and the quest for health, wealth and happiness
"By 2020 it’s estimated there will be more than 20 billion connected devices in use."
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.