IT Brief Australia logo
Technology news for Australia's largest enterprises

Security week news stories - Page 2

Story image
Tenable
More OT devices added to Tenable's industrial security offering
Most operational technology systems run in heterogeneous environments, with devices from numerous industrial vendors, often relying on unique, proprietary protocols.
Story image
Cybersecurity
Gartner CIO survey: enterprises are entering third IT era
“CIOs should use their financial resources to make 2019 a transformative year for their businesses.”
Story image
Identity and Access Management
SailPoint improves security and compliance with SaaS update
New in IdentityNow is the Dynamic Discovery Engine, which allows users to easily and quickly create policies, access reviews, dashboards and reporting.
Story image
Internet of Things
Gartner’s top tips to keep relevant in the face of change
“Continuous change can be made into an asset if an organisation sharpens its vision in order to see the future coming.”
Story image
Microsoft
New Zealand tops list of most-scammed countries - Microsoft
Around a fifth (21%) of New Zealanders who had encountered tech support scams were fooled into continuing with an interaction.
Story image
Blockchain
Gartner’s top 10 tech trends for 2019
Gartner has released a list of what it sees as the most important strategic tech trends to be aware of in the quickly upcoming year.
Story image
UEBA
ManageEngine adds user behaviour analytics to ADAudit Plus
With its dynamic alert thresholds, ADAudit Plus reduces the number of false positives and buys ample time for security teams to focus on the real indicators of compromise.
Story image
UEBA
Securonix and Cylance partner to drive end-to-end security offering
The two products will provide security operations centre (SOC) teams with a view of both cloud and endpoint security events.
Story image
IoT security
A/NZ businesses taking IoT security more seriously - MapR
53% of A/NZ companies now believe that keeping IoT secure is the greatest challenge they face in rolling out their IoT capabilities.
Story image
Okta
Exclusive: Cybersecurity in the API economy
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
Story image
CrowdStrike
Exclusive: CrowdStrike’s roundup of threats so far in 2018
“Increasingly, we see criminal groups are also using the techniques and tradecraft that were typically the domain of nation states to break into companies.”
Story image
Domain Names
Why protecting your DNS should never be an afterthought
Being such an integral part of the internet infrastructure makes DNS a popular target for cyber criminals looking to attack organisational networks and data.
Story image
Artificial Intelligence
Trend Micro’s four pillars of cybersecurity strategy
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
Story image
Network Access Control / NAC
Frost & Sullivan: Pulse Secure among best NACs for SMB to large enterprise
The recent Frost and Sullivan 2018 Network Access Control (NAC) Market, Global, Forecast to 2022 report states that network visibility is critical.
Story image
Cloud Security
Carbon Black announces enhanced cloud security offering
The Cb ThreatHunter announcement was made from the company’s annual user conference #CbConnect18 in New York.
Story image
Identity and Access Management
Organisations still can’t get access management right - One Identity
These and other findings paint a bleak picture of how many organisations approach IAM and PAM programs.
Story image
Cloud Security
How Symantec aims to buff up cloud security in APAC
Symantec recently announced innovations and expansions to its cloud security portfolio.
Story image
Ransomware
Cryptomining dethrones ransomware as 2018’s top threat - Webroot
This report also highlights the importance of implementing a robust and evolving security approach to protect valuable data and keep systems secure.
Story image
Social Media
Exclusive: Why social media platforms are so vulnerable to cyber threats
Social media breaches, including the Cambridge Analytica-Facebook incident, accounted for approximately 56% of total records compromised in the first half of 2018.
Story image
Operational technology
Industrial control systems: How to approach OT cybersecurity
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.
Story image
Machine learning
Machine learning is a double-edged sword for cyber security
IT departments and security decision-makers need to understand the complexity of AI in cyber security, and how to strike a balance between risk and reward.
Story image
Cloud
Security spending to reach $133.7bil in 2022 – IDC
The United States will be largest geographic market for security solutions with total spending of $39.3 billion this year.
Story image
Artificial Intelligence
Exclusive: Are we heading for the cyber security dark ages?
"Cyber attacks are getting more sophisticated, especially as IoT networks expand."
Story image
Passwords
Exclusive: Moving away from passwords to two-factor authentication
New developments in ‘zero log-in’ technology look set to redefine the authentication process as we know it and put paid to the dubious protection offered by passwords.