IT Brief Australia logo
Technology news for Australia's largest enterprises

SB Europe news stories - Page 2

Story image
DDoS
Cloudflare rolls out zero trust security for distributed workforces
"After decades of building legacy corporate networks, organisations are left with clunky systems designed to protect their now empty offices.”
Story image
DDoS
Education sector most at risk of DNS attacks - with a steep cost
84% of education organisations surveyed have been hit by DNS attacks, with each suffering an average of eight attacks.
Story image
Open source
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.
Story image
SD-WAN
Palo Alto Networks launches new SD-WAN solutions and enhancements
Palo Alto Networks has introduced two new SD-WAN appliances and enhancements to its next-generation SD-WAN solution, expanding the company’s CloudGenix SD-WAN solutions reach.
Story image
Social enterprise
Auth0 launches social impact platform & joins Pledge 1% movement
Auth0 has launched a new social impact platform that aims to provide secure access for nonprofit organisations and social enterprises.
Story image
Cloud
Microsoft brings endpoint & Azure security under Microsoft Defender
Microsoft Defender brings Microsoft 365 Defender and Azure Defender under the same umbrella.
Story image
Video conference
McAfee finds vulnerabilities in 'temi' the videoconferencing robot
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.
Story image
Industrial IoT
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.
Story image
Cloud
Phishing scam imitates SharePoint & OneNote for nefarious clicks
Sophos researchers say that the attackers take a slightly different approach to the standard ‘fake login’ phishing email.
Story image
Cryptocurrency
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.
Story image
Cybersecurity
Bitglass receives US patent for SAML technology
Bitglass designed its SAML relay to allow a cloud access security broker (CASB) to be inserted into the traffic flow between users and cloud services during the login process.
Story image
Cybersecurity
Check Point brings cybersecurity training to more with free edX courses
“Working with leading vendors like Check Point to offer free courses will help to upskill those people already working in the sector, and help to attract new talent to protect business and industry against damaging cyber attacks in the future.”
Story image
Connectivity
Forescout launches new updates to aid in defending the Enterprise of Things
"As organisations benefit from increased connectivity, they have a unique challenge of securing a complex network of desktops, laptops, servers, mobile devices, OT systems along with a rapidly expanding IoT ecosystem."
Story image
Malware
Machine identities increasingly exploited, new research finds
Venafi, the provider of machine identity management, finds that malware attacks using machine identities doubled from 2018 to 2019, including high-profile campaigns such as: TrickBot, Skidmap, Kerberods and CryptoSink.
Story image
IBM
Data breaches costing companies millions - could incident response help?
On average, data breaches cost companies $3.86 million per breach, with compromised employee accounts the most expensive root cause.
Story image
Remote Working
Forcepoint Dynamic Edge Protection delivers data-centric SASE solutions
The Dynamic Edge Protection suite includes new cloud security gateway and private access offerings through its SASE solution architecture.
Story image
Network Security
Juniper named a Champion in Canalys Leadership Matrix
Champions receive generally positive partner feedback, have a large share of shipments, maintain growth and show improvement in channel management.
Story image
Malware
ESET uncovers chat app malware spying and stealing user's data
The Welcome Chat espionage app belongs to a known Android malware family and shares infrastructure with a previously documented espionage campaign named BadPatch, which also targeted the Middle East.
Story image
Threat intelligence
Cyber threat intelligence reaching maturity in organisations worldwide
Cyber threat intelligence is reaching a state of maturity and integration in organisations across the globe, according to a survey by the SANS Institute and ThreatQuotient.
Story image
Cloud
Gartner recognises Pulse Secure for Zero Trust Network Access solution
In the market guide, Gartner states that ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate.
Story image
KnowBe4
Cyber attacks keeping business leaders up at night, new research finds
Data breaches and insider threats are keeping organisations up at night, according to new research from KnowBe4, the security awareness training and simulated phishing platform.
Story image
Cybersecurity
Cybercrims' web skimming strategies taint web analytics platforms
“This is a technique we have not seen before, and one that is particularly effective."
Story image
Internet of Things
NCC Group chosen to help improve IoT security standards for all sectors
“At NCC Group, security is in our DNA and that's why we're excited to work with the ioXt Alliance in raising security standards within the IoT ecosystem."
Story image
Endpoint Protection
Illumio launches Zero Trust endpoint protection solution for our digital, remote world
“As organisations were forced to transform overnight to allow for remote work, a host of endpoint security issues that have either been ignored or invisible until now were brought to the forefront."