CyberArk launches Forescout and Phosphorus integration to aid with IoT security
“Through our integration with Forescout and Phosphorus, CyberArk dramatically improves security and compliance, and alleviates the burden on IT and security teams."
Kaspersky identifies new banking malware targeting mobile users
UK university targeted by one million malicious email attacks
Trend Micro integrates with AWS Gateway Load Balancer for improved security function
Kaspersky unveils two major update to its Transparency Initiative
Rising threat of data breaches among enterprises drives growth in network security revenue
Claroty finds four vulnerabilities in Schneider Electric OT device
Ransomware attacks over SSL increase by 500%, Zscaler report shows
The research reveals the emerging techniques and impacted industries behind a 260% spike in attacks, using encrypted channels to bypass legacy security controls.
Financial firms exposing data through mismanaged access controls - Varonis
Almost two-thirds of the analysed firms leave more than 1000 sensitive files open for every employee to access.
Unisys adds new capabilities to Stealth solution
The latest 6.0 version features new automation and visualisation tools to accelerate deployment and simplify management.
Ransom DDoS attacks can be defeated with proactive prevention - Penta Security
Ransom DDoS combines a ransom demand with the threat of a DDoS attack. Those who don’t pay the ransom are then subjected to an attack.
Vectra expands NDR capabilities across all network environments
Vectra’s network threat detection and response (NDR) solution is designed to use cloud identities that track and link attacker activities and progression across all networks.
More than just malware, ransomware 2.0 hits businesses hard
Cyber criminals are shifting their focus from encrypting data to publishing confidential information online, according to new findings from Kaspersky researchers.
Interview: Why Acronis is building 111 micro data centres almost everywhere
We spoke to Acronis co-founder and technology president Stas Protassov to discuss these announcements.
In the sprint towards digital transformation, don’t neglect your data
Three tips to locate, secure, and understand dispersed corporate data.
Video: 10 Minute IT Jams - SonicWall VP on the benefits of Boundless Cybersecurity
Today's interviewee will discuss the ins and outs of the company's Boundless Cybersecurity solution and how it can help APAC organisations adjust to the new normal, as well as explaining the 'cybersecurity business gap'.
Voice phishing attacks on the rise, remote workers vulnerable
There is an increase in voice phishing attacks, where hackers use existing employee names in attempt to trick victims into sharing login credentials and data by phone.
Palo Alto launches enterprise data loss prevention service
The solution helps protect sensitive data at rest and in motion across every network, cloud and user access.
Fortinet named Leader in Gartner Magic Quadrant for Network Firewalls
It is 11th time the company has been recognised in the annual report.
With cyber-threats continuing to evolve, organisations need to remain in the fight in 2021
Teams can make improvements in 2021 by having a more comprehensive understanding of the threats that are out there and defining how they conduct operations to offer flexibility to adapt better.
Secure Code Warrior launches offering to help developers adopt a security mindset
Secure Code Warrior, the secure coding company, has launched a new educational offering that simulates realistic situations to help developers extend their coding skills and preparedness.
Trend Micro integrates with AWS Network Firewall
As a Launch Partner, Trend Micro has integrated managed threat intelligence feeds from its cloud security solution to enable superior protection in line with this new AWS managed firewall service.
The retailer safety guide for the world of online shopping
Are you an online retailer? This guide details the threats that you need to be aware of to keep safe in the biggest ever year of online shopping.
Zerto launches security solutions for containerised applications
The company has launched its beta program of Zerto for Kubernetes (Z4K), an extension of its Zerto Platform, to support next-generation, cloud native applications.
New CompTIA cybersecurity skills certification available worldwide
Private sector business and defense organisations alike rely on CompTIA Security+ to build cybersecurity skills among their frontline cyber defenders.
How has COVID-19 transformed our perception of work?
Almost three quarters (74%) of people never want to return to pre-COVID-19, traditional work paradigms, putting more pressure on employees to adequately support and secure changing workplace environments.
IDC names ESET a Major Player second year running
“ESET is strong in the areas of threat research, especially around Android malware identification and behavior detection.”
Acronis accelerates growth plans with CyberLynx acquisition
"Acquiring these capabilities will advance Acronis' mission to deliver world-class cyber protection to organisations around the world."
Radware expands DDoS prevention support for AWS
e are pleased to support Radware as they integrate their DefensePro Virtual Appliance for AWS with AWS Gateway Load Balancer,” says AWS spokesman.
DDoS attacks surge, becoming more sophisticated
After doubling from Q1 to Q2, the total number of network layer attacks observed in Q3 doubled again — resulting in a 4x increase in number compared to the pre-COVID levels in the first quarter.
Digital transformation and cloud security top of mind for enterprise
In the era of the coronavirus pandemic, digital transformation and cloud security are the chart-topping topics enterprises want to know more about.
Dell updates data protection/management solutions
PowerProtect DP series is an integrated data protection appliance, offering a range of capabilities to protect and manage data.
Palo Alto Networks launches enterprise data loss prevention service
"As a single centralised cloud service, Palo Alto Networks Enterprise DLP can be deployed across an entire large enterprise in minutes with no need for additional infrastructure."
The ultimate network security audit checklist
Experts project that losses and damage from cybercrime will skyrocket, with attacks ranging from spam and phishing to malware and spyware — all compromising the safety of sensitive data and proprietary information. These attacks can be minimised by performing network security audits regularly.
Check Point a Leader in Firewall Magic Quadrant for 21st Time
It is the 21st time in the company’s history that Check Point has been named a Leader in Gartner’s Magic Quadrant for Enterprise Network Firewalls.
Claroty and CrowdStrike form partnership to protect industrial control system environements
The integration will deliver visibility into industrial control system (ICS) networks and endpoints, with a one-stop-shop for information technology (IT) and OT asset information directly within The Claroty Platform.
ThreatQuotient & Infoblox integrate threat intelligence capabilities
“Together, our integration eases the consumption of threat intelligence from various internal and external sources to ensure that intelligence is accurate, relevant and timely to an organisation’s business.”
How a vantage point sees threats before they impact
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.
Data leakage concerns dominate cloud security perceptions - Bitglass report
How secure is the public cloud? That’s what many IT and security professionals are asking as data leakage becomes a pressing concern for organisations and their data protection strategies.
Check Point launches cyber security platform with autonomous threat prevention
"Today's fast-paced changes to business applications and deployments to the cloud require organisations to be more agile than ever before."
Attivo solutions launch on McAfee marketplace
Attivo Networks’ endpoint security solutions are available for free trial and purchase through McAfee’s new cloud marketplace.
CyberArk launches AI-powered service to remove excessive cloud permissions
“Cloud adoption has massively accelerated, but as new environments and cloud services are deployed, thousands of identity-based permissions are created – many of which go overlooked."
Ransomware the most common cyber threat to SMBs - report
The survey found that 60% of managed service providers report that their SMB clients have been hit as of Q3 2020.
Securing the 'next normal' — Check Point's cybersecurity predictions for 2021
“One of the few predictable things about cyber-security is that threat actors will always seek to take advantage of major events or changes – such as COVID-19, or the introduction of 5G – for their own gain."
Video: 10 Minute IT Jams - Vectra AI exec discusses cybersecurity for Office 365
In Techday's second IT Jam with Vectra AI, we speak again with its head of security engineering Chris Fisher, who discusses the organisational impact of security breaches within Microsoft O365, why these attacks are on the rise, and what steps organisations should take to protect employees from attacks.
Cybercriminals are leveraging AI for malicious use
"At a time where the public is getting increasingly concerned about the possible misuse of AI, we have to be transparent about the threats."
Forescout expands integrations with partner solutions
Expanded partnerships and integrations with Splunk, CrowdStrike and CyberArk allow for better IT and OT security posture for joint customers.