Why enabling a remote workforce requires converging security at the edge
Fast-tracking an agile yet more secure remote workforce requires a recognition of the fundamental importance of cloud services and mobile access play for today’s users.
Altering the actions of an attacker
Keyfactor and Primekey announce partnership to automate PKI
MEF grants 3.0 SD-WAN certification to Fortinet
Business climate stabilising for tech companies following COVID crisis - report
Businesses move to cloud-based security solutions in a bid to support remote working
The 5 most common multi-factor authentication (MFA) methods
Bitglass deepens integration with MFA vendor Duo Security
Bitglass has announced a deepened integration with Duo Security, now part of Cisco, as it looks to strengthen security for the modern workforce.
Radware extends cloud protection, adds multi-cloud support
It has also improved its attack detection engine to detect cloud native attack vectors and added a new attack simulation tool.
Cybersecurity spending slumps - but swift recovery expected
New research from GlobalData found that the industry will recover after this initial slump to be worth almost US$238 billion by 2030.
Banks failing customers when it comes to mobile app security
"Through these vulnerabilities, hackers can obtain usernames, account balances, transfer confirmations, card limits, and the phone number associated with a victim's card.”
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.
Crypto-of-Things: Mobile device security with cryptography at its heart
It’s a method that’s as safe as traditional airgapped hardware security modules, but it doesn’t compromise on software usability.
LogRhythm named #1 for customer satisfaction in G2 report
Named a Leader in G2 Research's reports for SIEM, Incident Response, and usability based on aggregated user rating data.
Oracle combines cloud automation with comms security in new solution
The Oracle Communications Security Shield (OCSS) Cloud is built on the company’s cloud infrastructure, and uses AI and real-time enforcement to combat the heightened risk of infrastructure attacks presented to contact centres and enterprises.
SonicWall expands offerings to cover distributed edge
Advances network edge security, adds multi-gigabit switch series, and easy-to-manage SD-branch capabilities.
HackerOne launches penetration testing to empower digital transformation
“In today’s agile environments, pentest platforms should seamlessly integrate with every aspect of the software development lifecycle so that findings are quickly pushed to the right developer and vulnerabilities are fixed faster."
CrowdStrike recognised as leading endpoint security vendor on global scale
IDC's report shows that CrowdStrike demonstrated a 2018-2019 growth rate of 99% and close to doubled its market share, while the market shares of the top three vendors in the corporate endpoint segment declined.
Microsoft releases latest edition of Security Endpoints Threats report
he latest iteration of the report sheds more light on the difference in exposure and response to cyber threats between developed and developing countries in APAC.
Cyber attacks keeping business leaders up at night, new research finds
Data breaches and insider threats are keeping organisations up at night, according to new research from KnowBe4, the security awareness training and simulated phishing platform.
Top 10 riskiest IoT devices for enterprises, according to Forescout
IoT devices can become attack vectors for hackers to gain access to enterprise networks, and recent Forescout research shows businesses need to be aware of this and put adequate security measures in place.
SaaS shouldn't left exposed to the public internet - how hybrid IT can help
By leveraging hybrid IT, enterprises can turn to a new architecture that leverages specialties such as colocation from multi-tenant data centres, and interconnection.
The infinite possibilities of Crypto-of-Things authentication
As devices and endpoints multiply, so do their security vulnerabilities. Unlock the power of cryptographic keys – here’s how the Crypto-of-Things makes authentication easier.
54% rise in gaming-related cyber attacks recorded in April
Social isolation measures, widely implemented throughout the world during March and April, has been linked to both the increase in engagement for gaming and a corresponding boom in game-related cyber attacks.
Cyber attacks use LinkedIn to target companies and employees
The attacks, which ESET researchers have called Operation In(ter)ception, took place from September to December 2019 and are notable for using LinkedIn-based spearphishing.
ExtraHop listed as Representative Vendor in Gartner guide
Gartner’s Market Guide for Network Detection and Response (NDR) has named ExtraHop as a Representative Vendor this year.
Interview: Checkmarx on the state of software security in Asia Pacific
"While the benefits of software are obvious, this proliferation also creates a massive and ever-evolving attack surface,” says Checkmarx A/NZ country manager Raygan Flores.
Common misconceptions about smart homes and biometrics
The real cause of most attacks is not biometrics itself, but the storage of biometrics data in a centralised database.
Multi-party computation: Security hardware & software in an unhackable shell
CoT provides a strong security guarantee without compromising on the benefits of software.
57% of IT professionals say their organisation uses NFV
Enterprise networks must support a growing number of distributed functions as well, which means there is more complexity and possibly skyrocketing Capex costs.
Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy
Okta, CrowdStrike, Netskope and Proofpoint have joined forces to develop and launch an integrated, zero trust security strategy, stating that this is crucial for today’s digital and remote working environments.
New channel leader for LogicMonitor APAC
Swapnil Shah heads to LogicMonitor after holding key roles at global systems integrators Infosys and Tech Mahindra.
Illumio launches Zero Trust endpoint protection solution for our digital, remote world
“As organisations were forced to transform overnight to allow for remote work, a host of endpoint security issues that have either been ignored or invisible until now were brought to the forefront."
Former Salesforce, Microsoft security exec to lead Zoom security team
Zoom has announced the appointment of former Microsoft and Salesforce executive Jason Lee as its new chief information security officer.
The future is passwordless - but roadblocks are slowing adoption
Multifactor authentication is innovating the login process and making it more secure. Here's how your business can overcome the hurdles and make it happen.
State-based cyber attack targeting Australian government and businesses
Prime Minister Scott Morrison told media on Friday morning that a 'malicious' attack by a state-based cyber actor is underway in the country.
Research: Rapid growth of embedded security market inevitable
With the rise of IoT, as cybercriminals find new ways to gain access to devices, new secure embedded hardware can block their points of entry.
Cybercrims' web skimming strategies taint web analytics platforms
“This is a technique we have not seen before, and one that is particularly effective."
Gartner recognises Pulse Secure for Zero Trust Network Access solution
In the market guide, Gartner states that ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate.
NCC Group chosen to help improve IoT security standards for all sectors
“At NCC Group, security is in our DNA and that's why we're excited to work with the ioXt Alliance in raising security standards within the IoT ecosystem."
IT pros report increase in security issues due to remote working
Security issues, IT workloads and communication challenges have all seen significant increases in the new remote working era, according to new research from Ivanti.
Trend Micro ranks number one in Global Hybrid Cloud Security - IDC
The cloud security firm enjoyed a market share of 29.5% last year, three times that of the number two vendor.
IBM report: Security response improving - containing attacks, not so much
“While more organisations are taking incident response planning seriously, preparing for cyber-attacks isn’t a one and done activity."
Attivo Networks raises the stakes against 'Ransomware 2.0'
“Advanced human-controlled ransomware can evade endpoint security controls and after initial compromise, move laterally to cause maximum damage, do data exfiltration and encrypt data."
Phishing attack exploited Samsung, Adobe servers for Office 365 credentials
The campaign used seemingly credible web domain names to lure its victims and bypass security filters, including from Oxford University, Adobe and Samsung.
Report: Brute-force attacks feed on remote working vulnerabilities
A new report from ESET has detailed the extent to which attackers employ brute-force tactics to infiltrate remote desktop protocols.
Oracle launches second Gen 2 Cloud region in India
“A large number of Indian organisations are looking to change growth orbits with greater focus on cloud-led innovation," states Oracle.
Fortinet resolves to help communities through new Corporate Foundation
“Through the establishment of a Corporate Foundation, we are extending investments in security training and education, employee community engagement and disaster relief efforts to empower and protect our communities, as well as positively impact our business, employees, customers and shareholders.”
Transform your authentication from a burden to a boon
Modern authentication tools can be operational burdens, introducing more problems than they solve. Here's how one solution can flip the script.