SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

VPN news stories

Story image
VPN
Palo Alto Networks says ZTNA 1.0 not secure enough
Palo Alto Networks is urging the industry to move to Zero Trust Network Access 2.0 because previous versions have major gaps in security protection.
Story image
VPN
Norton AntiTrack launches in New Zealand for better online privacy
The new privacy offering looks to help users control their digital footprints by preventing websites from tracking and profiling users in ways regular private browsers and VPNs don't.
Story image
VPN
Surfshark releases fake news filter for Chrome and Firefox
In a bid to prevent the spread of misinformation, Surfshark has announced the release of its fake news warning (FNW) extension for Chrome and Firefox.
Story image
VPN
Link revealed between censorship and VPN surges across Asia
Countries across Asia are experiencing a surge of VPN networks, an uptake that is likely due to increased censorship in the region.
Story image
VPN
VPNs are the MVPs, so what exactly can they help you with?
Although a VPN cannot guarantee you 100% anonymity, it does give an extensive amount of protection, so it may definitely be worth a look next time you want to nab a good flight deal or avoid those troublesome ISPs.
Story image
VPN
Surfshark adds a website safety warning feature to its browser extension
Surfshark created website safety warning feature that encourages people to be more mindful about the data they are giving to websites and digital platforms.
Story image
VPN
Remote work will be driven by managed services going forward
Reflecting on the past year, it’s clear that remote work played a significant role in maintaining business operations across A/NZ.
Story image
Firewall
SonicWall 'returns choice' to customers by securing different network environments
SonicWall’s Bill Conner has declared that organisations should no longer change the way they operate just to secure their networks, devices and people.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - Bitglass director on the evolution of remote working risks
In this interview, we talk to Bitglass senior director of marketing Jonathan Andresen, who is back for his fourth IT Jam.
Story image
Hybrid workforce
The future of work is hybrid — is your security ready?
Supporting a hybrid workforce while moving the needle on digital transformation requires a technology platform that adapts to changing business requirements.
Story image
Secure access service edge / SASE
64% of businesses will be using SASE next year, but large numbers confused about true meaning
Research has found 64% of businesses are adopting or plan to adopt SASE in the next year, but many say they’re still confused about its true meaning.
Story image
Cybersecurity
Why zero trust must form a key pillar of any cybersecurity strategy
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.
Story image
Secure access service edge / SASE
Despite the hype, pandemic-driven remote work has not led to wholesale SASE and SDP adoption - study
Only 12% of enterprises worldwide have fully embraced Secure Access Service Edge.
Story image
VPN
VPNs and zero trust security don't mix - Zscaler report
93% of organisations surveyed have deployed some kind of VPN, yet 94% know that VPNs are a popular target for cybercriminals.
Story image
Cybersecurity
Five big security questions facing CISOs
Given the global pandemic and the sudden shift in how the workforce operates, the CISOs worldwide have faced an unprecedented set of challenges. Several months into the transition, new struggles continue to arise, while many of the original ones remain unanswered.
Story image
Cybersecurity
22 billion records exposed from breaches in 2020 — report
The research also found that 35% of the breaches recorded by Tenable were caused by ransomware attacks, while 14% of breaches stemmed from email compromises.
Story image
VPN
SASE vs zero trust – or the best of both worlds
Zero trust and SASE work together by converging a least-privilege access strategy with an architecture that simplifies how highly distributed users, BYOD, and cloud resources are secured.
Story image
Cybersecurity
Top security threats for 2021
2021 will see several themes develop into full blown security threats, many of them borne from the struggles of pandemic-stricken 2020, writes Wontok head of technology Mick Esber.
Story image
SaaS
Three keys to keep remote workforce operational: VPNs, SaaS apps, and internet health
In many ways, the COVID-19 pandemic has ushered in what is effectively the largest work-from-home experiment ever conducted in human history. For many organisations, this has brought forward plans they had for digital transformation.
Story image
Cybersecurity
The current state of ransomware — and its future
Discoveries made by analysts at Sophos have unearthed a new development: ransomware code appears to have been shared across ‘families’, and some of the ransomware groups seemed to work in collaboration more than in competition with one another. 
Story image
VPN
ThousandEyes launches new business continuity features
"These new advancements to the ThousandEyes platform will give customers a comprehensive view of the dependencies that make up today's applications, services, and networks."
Story image
Secure access service edge / SASE
How a secure web gateway fits the SASE triangle
A perfect SASE triangle includes security for managed SaaS and IaaS, and the next essential piece: a secure web gateway (SWG), that secures the web and shadow IT. 
Story image
SaaS
NetMotion announces SASE platform leveraging Microsoft Azure
The platform offers integrated transport and web proxies, distributed firewalls, network access control (NAC), zero trust network access (ZTNA) or software-defined perimeters (SDP), a VPN highly optimised for mobile access, and AI-driven policy and risk analysis.
Story image
SD-WAN
Frost & Sullivan: Firewalls to drive network security market
Enterprises’ heightened threats from criminal entities and state-sponsored actors are strongly encouraging them to adopt network security solutions.