Cybersecurity strategy stories - Page 2

Security risks of neglecting the workforce experience – Avaya
Fri, 28th Jun 2019
#
avaya
#
user experience
#
cybersecurity strategy
Government departments and enterprises are wasting millions of dollars every year on cybersecurity because they fail to also invest in the user experience.

Exclusive: VMware’s challenges and opportunities in cybersecurity
Fri, 14th Jun 2019
#
virtualisation
#
it automation
#
compliance
While it’s still critically important to have a strong perimeter, it is widely accepted now that the status quo of security simply doesn’t work anymore.

Deakin Uni scores double win with Exabeam partnership
Mon, 20th May 2019
#
big data
#
data analytics
#
bi
Australia’s Deakin University is partnering with SIEM security company Exabeam in an effort to boost the university’s cybersecurity degree program and strengthen its SIEM capabilities.

General staff don’t get tech jargon - expert says time to ditch it
Thu, 16th May 2019
#
phishing
#
cybersecurity
#
email security
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.

Security professionals want to return fire – Venafi
Wed, 20th Mar 2019
#
devops
#
venafi
#
hacking
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.

How business leaders must prioritise cyber risk - Palo Alto Networks
Wed, 13th Mar 2019
#
firewall
#
network management
#
network security
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.

Flashpoint: Contextual data key to effective security
Mon, 4th Feb 2019
#
big data
#
data analytics
#
bi
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.

LogRhythm: Foster a culture of cybersecurity awareness
Fri, 1st Feb 2019
#
siem
#
wireless networks
#
logrhythm
According to the Australian Cyber Security Centre, the danger to local organisations has never been greater.

Achieving cyber resilience in the telco industry - Accenture
Mon, 21st Jan 2019
#
ddos
#
devops
#
devsecops
Whether hackers are motivated by greed, or a curiosity to assess a telco’s weaknesses; the interconnected nature of the industry places it in a position of increased threat

Implementing shared security models in the cloud
Tue, 8th Jan 2019
#
cloud
#
cloud security
#
application security
Developers aren’t usually aware of every control that should be implemented to ensure security in cloud environments.

How protecting critical infrastructure starts with securing social media
Tue, 1st Jan 2019
#
iam
#
passwords
#
cybersecurity strategy
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.

Govt announces cybersecurity grants for SMBs
Mon, 3rd Dec 2018
#
smb
#
grants
#
australian government
Over the next two years, eligible small businesses can apply for individual grants of up to $2,100.

How to configure your firewall for maximum effectiveness
Wed, 14th Nov 2018
#
manageengine
#
cybersecurity strategy
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.

Companies swamped by critical vulnerabilities – Tenable
Fri, 9th Nov 2018
#
tenable network security
#
report
#
cybersecurity strategy
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.

Don’t let your network outgrow your IT team
Thu, 8th Nov 2018
#
network infrastructure
#
network management
#
sdn
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."

Combatting the rise of Cybercrime-as-a-Service
Wed, 7th Nov 2018
#
cybersecurity
#
gdpr
#
malware
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.

Securing your cloud data: Point solutions vs single pane of glass
Mon, 5th Nov 2018
#
cloud security
#
unified threat management
#
forcepoint
Organisations that can use fewer security products that individually offer more capability are likely to have a lower total cost of ownership.

The key pillars of strong cybersecurity strategies
Fri, 2nd Nov 2018
#
cloud
#
devops
#
multi-cloud
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.

LogRhythm reports higher-than-anticipated SOAR adoption rate
Thu, 1st Nov 2018
#
siem
#
logrhythm
#
cybersecurity strategy
The company’s embedded security orchestration, automation and response (SOAR) capabilities are embedded in its security information and event management offering.

More OT devices added to Tenable's industrial security offering
Fri, 19th Oct 2018
#
tenable network security
#
operational technology
#
cybersecurity strategy
Most operational technology systems run in heterogeneous environments, with devices from numerous industrial vendors, often relying on unique, proprietary protocols.

GDPR compliance: Looking beyond the hype
Wed, 17th Oct 2018
#
data protection
#
gdpr
#
rubrik
With contrasting advice coming from all angles, the line between GDPR fact and fiction has become blurred.

Exclusive: Cybersecurity in the API economy
Mon, 15th Oct 2018
#
okta
#
api management
#
cybersecurity strategy
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.

Trend Micro’s four pillars of cybersecurity strategy
Thu, 11th Oct 2018
#
cloud
#
ai
#
cloud security
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.

Industrial control systems: How to approach OT cybersecurity
Tue, 9th Oct 2018
#
operational technology
#
cybersecurity strategy
#
pas global
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.