Salesforce continues to stumble after critical outage“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
It's 'lights out' for two more dark web marketplaces
Don’t be fooled if you see talk that Wall Street Market has been taken down – because it’s most likely not what you think.
What your privacy means to Google - and what it's doing about it
Google has declared that it’s all about making privacy work for everyone – despite its long-held reputation as an information harvester.
Whitepaper: How classifying your log messages makes for happier sysadmins
Operating systems, applications, and network devices generate text messages of the events that happen to them.Download
Aruba announces automated security and wireless solutions
New AI-powered ClearPass Device Insight and expanded Wi-Fi 6 portfolio extend increases Aruba’s capabilities in security, connectivity and analytics.
Silverlake and Intel partner on edge security
With Intel’s software and hardware technologies, Silverlake’s technology stack designed for PAM will form a cybersecurity PAM product line.
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
Blockchain, edge, AI & ML - Microsoft goes all-out for devs
Microsoft is launching a swath of new developer technologies and Azure services designed to bring AI, blockchain, mixed reality, and IoT to the forefront of development.
SolarWinds adds Mac capabilities to dashboards
Ability to manage both Mac and Windows devices on the same dashboard will streamline monitoring and management for MSPs.
Two years on: Have organisations learnt from WannaCry?
This month marks a special anniversary – two years since one of the world’s most destructive pieces of ransomware ever caused chaos.
Failure to prioritize cybersecurity stunting digital transformation – Frost & Sullivan
Security leaders need to look beyond perimeter security, leverage automation, and have a better grasp of the psychology of both cybercriminals and their business users.
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
BeyondTrust updates remote access solution
Updates in version 19.1 include AWS availability, UI improvements, Mojave support, and more.
How a virtual CISO can become part of a managed security regime
Security-as-a service is a particularly compelling option for smaller businesses that perhaps do not yet have the resources to adequately maintain a cybersecurity regime internally.
PrinterLogic software vulnerable to remote attacks
The vulnerabilities affect PrinterLogic versions 184.108.40.206 and older.
Another cryptocurrency exchange breached, but at least investors are safe
It takes patience to steal more than 7000 Bitcoin (approximately US$41 million) from cryptocurrency exchanges, despite global awareness that such attacks are becoming more prolific.
Cybera brings remote network operations into clear focus
SD-WAN and security service provider Cybera has released a cloud-based management solution designed to provide deeper insight into remote network operations.
Kemp: Three common IoT security pitfalls
Research shows that IoT is disrupting markets and IT organisations worldwide, changing economics and agility in many markets.
Unisys: Users looking for data security when choosing banks
The report studied attitudes of banking customers in Hong Kong, Australia, New Zealand, the Philippines and Taiwan.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Samsung left Bixby & SmartThings code wide open to the public
If you’re someone who likes to use apps and platforms with some level of confidence that they’re secure, you may want to take another look at how much you trust big brands like Samsung.
Leveraging cyber threat intelligence to benefit security posture
One out of five companies are still unsure of CTI’s value to their organisation.
Axis: How artificial intelligence will impact security
AI systems are able to analyse huge amounts of data, which is advantageous when an employee has to review hours of surveillance images.
Symantec, Ixia combine efforts to secure hybrid networks
Ixia’s CloudLens and Symantec Security Analytics now feature complete integration, which allows Symantec customers to gain real-time visibility into their hybrid cloud environments.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
Exabeam plans to use $75m fund to leave legacy SIEM vendors in the dust
SIEM provider Exabeam predicts that it will leave legacy providers in the dust, and it’s all down to a US$75 million Series E funding that will be used to ‘displace’ legacy security management vendors.
Forcepoint 2019 APAC Channel Partner Award winners announced
The company recognized 9 partners across 6 categories based on criteria including overall revenue performance and new business growth secured in 2018.
D-Link security cams vulnerable to spying
Security researchers at ESET have discovered serious security holes in the D-Link DCS-2132L cloud camera.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
SIEM: Expensive? Storage-intensive? Not any more with these performance tips
SIEM can be expensive, eat up storage, and overwhelm IT teams with the sheer differentiation of log data formats that they need to process. Yet SIEM is now an essential part of an organisation’s security strategy.Download
Microsoft achieves FIDO2 certification for authentication solution
FIDO2 is a set of standards that enables easy and secure logins to websites and applications via biometrics, mobile devices and/or FIDO Security Keys.
Mimecast: Employee training must supplement application security
A company’s biggest security risk is unintentional employee negligence.
Bait, hook and catch – targeted spearphishing on the rise
Spearphishing attacks, where a threat actor impersonates employees or popular web services, are on the rise.
WatchGuard expands partner program with financial incentives
In the expanded program, partners can earn WatchGuardONE status by specialising in just one of the available product families.
How edge data centres can help accelerate your business
Edge computing is an IT architecture designed to put applications and data closer to the users or “things” that need them.Know More
Four steps to Zero Trust network security - AlgoSec
The core principles of zero trust reflect the reality of today’s complex, heterogenous enterprise network environments.
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Trustwave brings database security scanning to the cloud
Trustwave DbProtect allows customers to protect big data stores across (and in between) major cloud services.
Exclusive: Okta CSO on scaling security alongside business growth
Yassir Abousselham shares his unique insights as the chief security officer of a fast-growing identity and access management service provider.
SolarWinds: Looking beyond DevOps to fix cybersecurity
The role of DevOps in security has seen increasing popularity due to its sound philosophy around productivity and adaptability.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
CrowdStrike integrates firmware attack detection in endpoint protection
Most security products remain blind to attacks that attempt to leverage BIOS firmware to infiltrate endpoints, leaving organisations vulnerable to compromise.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
Should you run your central log server in Docker?
Collecting logs can be especially important in a containerized environment, where you start and stop containers around the clock.Download
61% of IT professionals have experienced serious data breach - McAfee
Data breaches are becoming more serious as cybercriminals continue to target intellectual property.
Paranoid Android? Examining three key trends in Android malware
It definitely doesn’t mean you are paranoid if you’re worried about Android security: the threat landscape is growing in every dimension.
IT admins: Exploit the benefits of advanced log classification
It’s not hard to say ‘I don’t envy you’ to system administrators who are lumped with the burden of classifying log messages every time somebody conducts an action on the network.Download
Whitepaper: Five essential steps to protect your company’s critical data
The increase in devices being used by employees and the number of cloud apps necessitate multiple different channels of accessing a company’s information in a secure manner.Download
Businesses failing to secure BYOD - Bitglass
Report finds that 74% of organisations allow BYOD but nearly half lack clear security policies and best practices.
Red Hat’s new role in enabling modern DevOps
The global open source vendors approach has come of age.
Whitepaper: How you can simplify compliance and SIEM with efficient logging
IT environments generate log messages with a variety of functions and significance to an organisation – but they’re only useful if they trigger the necessary responses.Download
Endace enhances analytics with 10GbE deep storage solution
The 8200 Series combines accurate packet capture with deep storage capacity, rapid-search capability and hosting density in a compact 2RU footprint.
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
An insider's tips on how to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download