IT Brief Australia logo
Technology news for Australia's largest enterprises

Security news stories - Page 2

Story image
SonicWall recognises partners and distributors at FY2022 partner awards
SonicWall has recognised its distributors and partners for their efforts in producing the company’s most successful year to date.
Story image
Privileged Access Management / PAM
Delinea unveils new Secret Server features and improvements
Delinea has announced new features and enhancements to expand the capabilities of its Secret Server, including design updates and new security controls.
Story image
Video: 10 Minute IT Jams - An update from Mandiant
Today we are joined by Louis Tague, who is the VP and managing director for A/NZ at Mandiant. We discuss what kinds of trends to company is seeing in the market and what new innovations they have in the pipeline.
Story image
Secure Code Warrior
Secure Code Warrior adds new solution to Okta Integration Network
The company says the new technology enables a cohesive approach to secure coding, ensuring developers meet requirements before committing code.
Story image
Business Continuity
New report highlights top supply chain concerns for 2022
A new ISACA survey report illuminates IT professionals’ key concerns around security challenges and how their organisations are responding to them.
Story image
Video: 10 Minute IT Jams - An update from SonicWall on ICSA certification
In a new addition to our SonicWall series, we are joined today by Ken Law, who is the team lead, sales engineering for the ASEAN region.
Story image
FIs failing to adequately secure cloud, leading to huge losses
Not moving to more reliable cloud options is costing FIs 21%-50% of revenue on average yet only 2% of financial institutions are planning to change providers.
Story image
From the digital ceiling to a digital floor
The pandemic has upended all sorts of preconceptions – and the world of business has been far from immune.
Story image
Why personalised CX will pay off for Asia’s banks
In just a few years, well-funded fintech firms, mobile wallets, trading apps and digital-only banks have revolutionised the centuries-old banking industry.
Story image
Multi Cloud
Entrust strengthens multi-cloud security for enterprises
Entrust has strengthened its enterprise security and control for multi-cloud deployments, a move set to help DevSecOps and security administrators maintain a better security posture in cloud environments.
Story image
Taking a data-driven approach to SOC operations
SOC teams are under pressure to detect security events and rapidly respond, and this is hard to do when they are drowning in data.
Story image
WolfVision releases new Cynap Pure Mini screen sharing solution
WolfVision has launched the WolfVision Cynap Pure Mini, a new wireless screen sharing solution that looks to enable easier and more effective presentations.
Story image
Viettel IDC deploys Cloudian Hyperstore object storage for enhanced cloud solutions
Cloudian has announced that its Hyperstore object storage has been deployed by Vietnam telco Viettel IDC, citing the technology’s flexibility, multi-tenancy and ransomware protection as significant advantages.
Story image
The path to bolstering supply chain security in New Zealand
A significant amount of today's business and leisure activity relies on IT supply chains. From complex international freight trades to local small business distribution channels, any supply chain that involves IT infrastructure serves as a crucial tool in our daily lives. 
Story image
4/10 Australian SMEs fallen victim to cyber-attacks since pandemic
Almost four out of teb SMEs in Australia have fallen victim to cyber-attacks since the pandemic began, according to a new study.
Story image
Identity and Access Management
The post-pandemic workforce requires secure IAM capabilities
HID Global discusses what identity and access management means for organisations in today's convoluted digital world.
Story image
Check Point
Check Point and CCTV expert join forces to boost protection
The partnership will involve Check Point Quantum IoT Protect Nano Agent being embedded in Provision-ISR’s CCTV cameras for on-device runtime protection.
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.
Story image
MailGuard warns of new scam targeting Telstra customers
Telstra customers in Australia are being warned of a new scam involving "Unsuccessful Payment" messages.
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
The most common online scams in Australia
No one is safe from online scammers, and many of these scammers have capitalised on the pandemic, using this confusing time to attack more people than ever.
Story image
Data backup plans inadequate, data still at risk - study
The Apricorn 2022 Global IT Security Survey revealed that while the majority organisations have data backup plans in place, data for many are at risk.
Story image
Supply chain
Jetstack promotes better security with supply chain toolkit
The web-based resource is designed to help organisations evaluate and plan the crucial steps they need to establish effective software supply chain security.