Delinea shares the importance of PAM, partners and security for modern enterprise
Identity-based security is becoming a crucial tool for modern enterprises as they continue to adapt to different working environments.
SD-WAN security market to exceed $16.9 billion by 2032 - report
A new report from Future Market Insights finds that the SD-WAN security market is set to surpass US $16.9 billion in the next decade.
CyberRes brings latest in discovery and data protection to FAS
CyberRes has announced a new version of Voltage File Analysis Suite (FAS), a cloud platform that combines the latest in data discovery and data protection.
IT in Healthcare
Keeping Australian hospitals safe from cyberattack
In April this year, the Security Legislation Amendment (Critical Infrastructure Protection) Act 2022 came into effect in Australia, extending the scope of the Security of Critical Infrastructure Act 2018 to also apply to healthcare and the medical sector.
Leveraging the human factor as part of an organisation’s overall cybersecurity framework
In this digital era, automation plays a critical role in the race to support a dynamic and agile security posture. However, there is one area that is often overlooked: the human factor.
Exclusive: Bitdefender on ensuring cyber safety in today's threat landscape
As complex cybercrime continues to increase across the globe, Bitdefender's ultimate goal is to continue to be a trusted cybersecurity provider with expert skills and technologies to help.
UTS switches to Rimini Street for database security and management
The University of Technology Sydney (UTS) has announced that it has switched maintenance, support and security management of its Oracle database and technology platforms from Oracle to Rimini Street.
Concentric AI listed in Gartner's Hype Cycle report
Concentric AI has been listed as a Sample Vendor in the newly created Data Security Posture Management category in the 2022 report.
Kaspersky integrates Threat Data Feeds with Microsoft Sentinel
With this integration, teams can extend threat detection capabilities and increase the effectiveness of initial alert triage, threat hunting or incident response.
Aotearoa's new Privacy Commissioner shares focus moving forward
In early June 2022, Justice Minister Kris Faafoi announced the appointment of the new Privacy Commissioner.
Mandiant appoints Westcon-Comstor as NZ distributor
Mandiant has appointed Westcon-Comstor as its distributor in New Zealand in order to enhance channel growth and provide better solutions to customers.
Fortinet research reveals lack of enterprise security awareness in A/NZ
New research from Fortinet has found that just over half of A/NZ enterprises believe they have the right strategies and technologies in place to deal with cyber threats.
Absolute Software Corporation
Absolute Software sees significant revenue increase for F2022
Absolute Software has revealed its fourth quarter and full-year fiscal 2022 financial results, reporting substantial revenue increase and company growth.
Special report: Okta provides insights around Zero Trust adoption in APAC
Digital identity has become paramount to enterprise security as changes to business climates occur, and organisations across the globe are slowly shifting towards implementing Zero Trust solutions.
How to enhance digital threat monitoring with machine learning
As part of a complete digital risk protection solution, a digital threat monitoring (DTM) solution automatically collects and analyses content streamed from external online sources.
Exclusive: Checkmarx on the state of API security and keeping developers safe
APIs are becoming significantly more exposed, leading to security issues across all spectrums of a business. This is why it is important to have the right security software solutions in place.
Kaspersky achieves AAA expert rating for EDR products
Independent security testing organisation SE Labs has awarded Kaspersky Endpoint Detection and Response Expert a ‘AAA’ rating.
Consider the benefits of UEBA technology with MDR experts at the helm
Best-in-class security technology complements great expertise, and vice versa. To significantly improve security posture requires both.
Video: 10 Minute IT Jams - An update from Coevolve
Today we are joined by co-founder and CTO of Coevolve Ciaran Roche, for a special SD-WAN feature week presentation.
Malicious app downloads
Bitdefender finds malicious campaign active on Google Play
Bitdefender has released research about a new Google Play campaign that bypasses the storefront's security checks to deliver potentially malicious content and advertisements.
The five key pillars that support effective cloud architecture
Lucid explains why cost optimisation, realiability, operational excellence, performance efficiency and security are so important for effective cloud architecture.
Secureworks CTU uncovers new information about DarkTortilla malware
Secureworks CTU researchers have found new information about the DarkTortilla malware, revealing more about its versatility and scope within the threat landscape.
Fortinet attributes Gartner-reported growth to ZTNA approach
Zero-trust is slowly becoming a dominant enterprise security strategy for businesses, and the Gartner report highlights that although prominent, it is often underutilised.
Benefits vs risks of facial recognition technology
Once a distant, futuristic concept, facial recognition technology is now found in many technological applications with a variety of different functions.