Digital Transformation / DX
Artificial Intelligence / AI
Internet of Things
Cybersafety stories - Page 3
What Is TLS 1.2 — and why should we still care?
Gigamon country manager for A/NZ George Tsoukas takes a closer look at the history of cryptographic protocols.
Cybersecurity roadblocks: 5 things leaders need to act on now
In 2021, organisations must focus on security as the foundation for safely creating, storing and managing data.
Beware the top three blind spots that precede cloud data breaches
The ability to correlate individual events/alerts over time into an attack ‘storyline’ can help mitigate major cloud security blind spots.
Cybersecurity in the age of AI
Autonomous Response is necessary not only because humans cannot keep up with today’s threat climate, but because AI-based attacks are approaching.
vArmour joins Microsoft Intelligent Security Association
Armed with vArmour’s solutions, the company says that Microsoft’s customers can now gain more visibility over user access to critical applications.
Barracuda acquires XDR platform SKOUT Cybersecurity
With the acquisition, Barracuda begins its foray into the XDR market, and supplements the company’s previous integrations with Open XDR platforms.
Ignorance is bliss — for hackers
Failure to employ best-of-breed security practices may result in a very uncomfortable talk with CEOs and boards of directors.
Interview: Assessing the challenges in securing emerging technologies
In his almost 20 years in the cybersecurity industry, Infosys CISO Vishal Salvi has watched threats change — and how they've ramped up in the last 18 months.
IDC names APAC Leaders in cloud security services sector
Seven vendors were designated Leaders in the space, with IDC noting that these providers demonstrated leadership in the provision of cloud-native security.
Why zero trust must form a key pillar of any cybersecurity strategy
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.
How organisations can protect their print privacy in a digital world
Learning how to better protect the data used and stored by organisations’ print systems is in their best interests for the company’s future success.
How to recover from a ransomware attack faster and return to business acceleration
When an organisation can recover quickly from a ransomware attack, organisations can accelerate growth safely and reliably.
Proactively mitigate cyber risk with MISP and TheHive
When an attack happens, security teams should be ready with information about who is attacking and the steps being taken to mitigate damage.
DDoS attack report finds attack volumes up dramatically
The DDoS attack report analyses attack activity by industries, attack vectors, DDoS attacks on applications and on-premise versus cloud.
How SASE is helping organisations forge new digital work experiences
More organisations are reimagining the way that staff connect from remote locations, writes ThousandEyes principal solutions architect Mike Hicks.
Healthcare, manufacturing and finance sectors accounted for 62% of all cyber-attacks in 2020
The healthcare industry was the hardest hit, with 97% of all hostile activity targeted at the industry being web application or application-specific attacks.
Three ways to prioritise cybersecurity for maximum protection
CISOs should implement this three-pronged approach to prioritising cybersecurity concerns, writes Fortinet regional director for ANZ Jon McGettigan.
Spending on cybersecurity and risk management tech to hit $150 billion in 2021
“Looking ahead, we’re seeing early market signals of growing automation and further adoption of machine learning technologies in support of AI security."
Best practices and key factors for identity management
In parallel with any physical form of identification, digital identities must be protected at all costs to prevent identity theft or fraud.
The challenge of ensuring effective protection against DNS attacks
The ways in which bad actors can use DNS to mount attacks are numerous. Here are some of the most popular ones.
Video: 10 Minute IT Jams - SonicWall manager dissects zero trust security
Today’s interviewee is SonicWall head of presales for APAC, Yuvraj Pradhan, who discusses various talking points surrounding zero trust security.
Why DevSecOps must strive for effective enforcement measures
Threats to applications go beyond exploiting code and logic vulnerabilities which are already more than enough to analyse and cope with.
'Catastrophic forgetting': What it is, and how to prevent it
AI has been used to combat cyber-threats for years. But there are many related pitfalls — and catastrophic forgetting is a major one.
Protecting endpoints (and users) that have left the office
To access work emails, it may suffice to use with multi-factor authentication. But if users want to access customer data, that security control isn’t enough.