Tesla's suit against ex-employee a strong case for IP security
“There was no need for this employee to be using their own iCloud for data storage even if the original intent was non-malicious."
Marriott, British Airways fines highlight critical need for security investment
Financial organisations plagued by spear phishing attacks
Whitepaper: Setting up syslog-ng storage in Elasticsearch
Insider threats & breach reports: Why security needs more investment
Fortinet extends application security on Amazon Web Services
HCL Technologies closes acquisition of IBM products
Why businesses are not ready to implement 5G - Cradlepoint
A new study from Cradlepoint reveals that businesses expect 5G to be a major part of their technology roadmap but have a long way to go before they are ready to implement a solution.
AI for fraud detection to triple by 2021 - ACFE
While only 13% of organisations use AI and machine learning to detect and deter fraud, another 25% plan to adopt such technologies in the next year or two.
Enterprise at tipping point, says Symantec
Enterprises are struggling to keep up with the rapid expasion of cloud within their business.
Whitepaper: Using syslog-ng’s pattern database to analyse log messages
Log messages can be used to detect security incidents, operational problems, policy violations, and are useful in auditing and forensics situations.
Cyber threats: Legacy systems aren't always the culprit
There is a common misconception that product security is the only way to mitigate vulnerabilities and threats.
Australia, NZ and Singapore in cybercriminal firing line
"Cybercriminals continue to develop new, more sophisticated attack methods, and they are carrying them out with astonishing frequency."
Cybersecurity market increasingly competitive as public cloud segment grows
Cybersecurity solutions for public cloud and ‘as a service’ offerings are continuing to grow, however traditional hardware and software deployments still dominate the market.
Malware and malicious Office documents on the rise in 2019 - WatchGuard
Hackers are doubling down on well-known tactics like credential theft and ransomware by utilising fake Office documents and other attack avenues.
Using Splunk in conjunction with syslog-ng for log management
Collecting and centralizing log messages from network devices such as routers is one of the most common deployments of syslog-ng with Splunk.
Global banks fail to keep up with application security
One bank had an unpatched vulnerability that has existed since at least 2011.
Rapid increase in AI to detect fraud
"Criminals are finding new ways to exploit technology to commit schemes and target victims."
Ping’s significant expansion of its cloud identity solution
PingOne for Customers adds new features designed to create seamless and secure user experiences.
Log classification doesn’t have to be mundane and repetitive – here’s how
It’s not hard to say ‘I don’t envy you’ to system administrators who are lumped with the burden of classifying log messages every time somebody conducts an action on the network.
Report: Why vulnerability assessment is the first step in security strategy
Tenable’s latest research examines real-world vulnerability assessment practices at 2,100 organisations to see how they’re approaching cyber hygiene.
10 times malware proved that MacOS isn't bulletproof
Mac users need to come to terms with the fact that their devices are not immune from attack.
Huawei working to patch critical security vulnerabilities
Huawei is proactively working with Swascan researchers to fix the vulnerabilities, which could affect three main areas: confidentiality, integrity, and availability.
Responsible AI starts with responsible leaders - PwC
Responsible practices in artificial intelligence (AI) starts with how each individual organisation plans to strategise, design, develop, and deploy the technology.
Thailand leads ASEAN into a secure digital future
As the chair country of ASEAN, Thailand aims to advance the community towards a future that includes a digital ASEAN.
One-size-fits-all not enough to secure IoT
"The growing trend for greater connectivity puts everyday objects at risk of exploitation."
CyberX launches automated threat extraction platform
Unlike other traditional threat intelligence, Ganymede focuses on IoT/ICS/OT-specific threat intelligence for industrial and critical infrastructure organisations.
Whitepaper: Why accurate log processing is key to effective SIEM
SIEMs form the core of many enterprises’ IT security strategies, but they can be expensive to deploy and maintain.
Protecting remote staff from phishing attacks – WatchGuard
Close to 50% of Australian employees worked remotely for at least half the time, according to a 2018 survey by IWG.
Why the multifunction device poses a security threat
“When putting together a security strategy, printers and MFDs are often overlooked as innocuous devices."
Whitepaper: Measuring SIEM’s ability to create actionable defence
Many organisations are struggling to keep pace with the speed in which hackers are attacking their system.
Major vulnerability found Electronic Arts gaming client
Once exploited, the vulnerabilities would have led to player account takeover and identity theft, Check Point and CyberInt found.