Major security, privacy and ethical blindspots in AI development
Security, privacy and ethics are low-priority issues for developers when modelling their machine learning solutions.
September’s top malware, Emotet botnet strikes again – Check Point
Sophos Cloud Optix SaaS offering now on AWS Marketplace
Sophos launches managed threat response service
Trend Micro named as leader in endpoint security
Disruptionware emerges as newest and nastiest cyber threat
Microsoft announces Azure Sentinel SIEM general availability
Exclusive: Aruba security VP on IoT security, encryption, and UEBA
Aruba security VP and chief technologist Jon Green shares his views on how the changing trends are affecting the way networks are secured.
GitHub amps up vulnerability reporting capabilities
GitHub has announced new capabilities that make it easier for developers to report vulnerabilities directly from their repositories.
Public dataset to help researchers predict malicious activity unveiled
The dataset comprises 51.6 malicious activity reports involving 662,000 unique IP addresses across the globe.
DXC Connect named ExtraHop’s 2019 Breakthrough Partner
DXC Connect has built out a major service offering focused on the ExtraHop suite of cloud-native network detection and response (NDR) solutions.
BitSight and ServiceNow announce integrations improving cyber risk management
Together, BitSight and ServiceNow provide organisations with prioritised visibility and automated workflows to manage cyber risk.
Enterprise incident response plans suffer from neglect – Verizon study
Incident response plans may be a useful part of cyber-preparedness, but they’re of little use if security teams don’t review, test or update those plans on a regular basis.
IBM outlines why the 'boom' moment is key to better security
“Often I’m talking with people on the worst day of their business’ life.”
Fortune 500 companies failing to demonstrate cybersecurity commitment - Bitglass
The report found that 38% of the 2019 Fortune 500 do not have a chief information security officer (CISO).
Symantec updates endpoint security offering
The Symantec Endpoint Security (SES) brings automated assistance with security management to evaluate risks and take action to secure their organisation.
nCipher launches HSM-as-a-Service for organisations adopting cloud-first strategies
nShield-as-a-Service is ideal for cloud-first strategies, selective cloud migration, or adding HSM capacity to handle workload spikes.
WatchGuard releases new ruggedised network security appliance
The Firebox T35-R provides network security capabilities beyond traditional office settings and to industrial internet of things (IIoT).
IoT devices lacking basic security assessments
Research firm Independent Security Evaluators (ISE) found 125 vulnerabilities in 13 IoT devices, reaffirming an industry-wide problem of a lack of basic security diligence.
Online users giving out social media details too freely - Kaspersky
The survey revealed that online users in Asia Pacific appear to be willing to share their private information in exchange for various personal gains from social media.
Most organisations exhibiting malicious RDP behaviour - report
Remote Desktop Protocol is a vital tool for managed service providers (MSPs) in their management of hundreds of client networks and systems.
WatchGuard releases cloud-based service to automatically block phishing attempts
DNSWatchGO aims to fill security gap beyond the network perimeter, as new research shows 64% of remote users have fallen victim to a cyber-attack.
IBM announces z15 with new data privacy capabilities
The IBM z15 is a new enterprise platform delivering the ability to manage the privacy of customer data across hybrid multicloud environments.
BlackBerry creates R&D lab to stay on security's cutting edge
BlackBerry has created a new cybersecurity research and development (R&D) unit comprised of more than 120 security experts to drive the company’s mission to drive security innovation.
Are Fortune 500 companies failing at cyber security?
"Lax security and its resulting breaches have long-term repercussions for organisations as well as their customers, shareholders, partners, and other stakeholders."
Seven experts talk security automation & analytics
"It all comes back to understanding your capabilities, building your playbooks, and finding a tool that can help you automate. That’s the path you have to go take, because without automation, you’re an easy target.”
Veritas and Pure Storage team up to reduce downtime for applications and services
Three new integrations just announced extend the collaboration across the Veritas Enterprise Data Services platform providing Veritas and Pure Storage customers with business continuity.
ESET breaks down attacks targeting gamers and IT manufacturers
The Winnti Group is known for its espionage capability and targeted attacks, although financial motivations cannot be excluded.
ESG puts Juniper Networks security solutions to the test
With a multitude of solutions on the market, ESG decided to use malware attacks to evaluate market solutions like Juniper Networks’ automated threat detection and remediation.
Social media a growing business risk across Asia Pacific
Organisations now face an even wider risk landscape, as they seek to tackle emerging digital threats and deal with complex reputational and regulatory issues.