Cybersecurity and threat news for Europe, the Middle East & Africa
The future of privacy: What comes after VPNs?
"75% of VPN users said they are seeking a better solution for cloud networks."
SonicWall secures hybrid clouds by simplifying firewall deployment
Once new products are brought online in remote locations, administrators can manage local and distributed networks.
Cisco expands security capabilities of SD-WAN portfolio
Until now, SD-WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Exclusive: Okta’s new GM shares its APAC strategy
“We believe that partnering with systems integrators, independent software vendors and consulting companies is a key factor of success for Okta.”
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.
Gartner names Bitglass a leader in cloud security
Bitglass was evaluated based on its ability to execute and its completeness of vision.
Five major risks of letting shadow IT go unchecked
A department creating its own bespoke IT solution may sound like a good idea, but are the risks really worth it?
LogRhythm reports higher-than-anticipated SOAR adoption rate
The company’s embedded security orchestration, automation and response (SOAR) capabilities are embedded in its security information and event management offering.
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Organisations lack holistic approach to data protection
It is paramount for organisations to have a clear understanding of what data protection is and close the gaps in their protection strategies.
Voter databases available on the dark web - report
A Carbon Black threat report has revealed that destructive cyberattacks are increasing ahead of 2018 US midterm elections.
Gartner: data risk audit executives’ top concern for 2019
Annual Audit Plan Hot Spots Report reveals multiple risks and a lack of preparation around corporate data and analytics efforts.
Whitepaper: The evolution of physical access control
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
McAfee announces new endpoint protection and cloud security products
For organisations to adopt the cloud with peace of mind, they not only need visibility, but consistent data and threat protection policies across their data and applications.
Universities seeing rise in DDoS attacks
Overall, between July and September, DDoS botnets attacked targets in 82 countries.
The potential of secure data storage and analytics
According to a recent study, the data industry still has a lot of untapped potential.
Oracle’s Ellison calls out Amazon with next-gen cloud
Larry Ellison claims the rest of the cloud market is based on decade old technology with poor security, comparing Oracle's new offering with Amazon.
Supermicro to test for spy chips, Apple & AWS call for retraction
Big feathers have been ruffled following the bombshell Chinese spy allegations, and now Supermicro has announced it will be conducting a review to prove its innocence.
ICO report reaction: UK data security incidents rocket 224%
Data security incidents have risen 228 percent in the second quarter of 2018, while fines have doubled.
More OT devices added to Tenable's industrial security offering
Most operational technology systems run in heterogeneous environments, with devices from numerous industrial vendors, often relying on unique, proprietary protocols.
GitHub’s ‘universe of data’ empowers developers
“These past ten years have been the most transformative in tech,” says GitHub SVP Technology Jason Warner.
Why operational technology environments need to be secured
By understanding the cybersecurity risks in OT, decision-makers are better placed to make smart buying decisions.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Details of 9mil compromised in Cathay Pacific data leak
Twenty-seven credit card numbers with no CVV were accessed, and the combination of data accessed varies for each affected passenger.
Securonix and Cylance partner to drive end-to-end security offering
The two products will provide security operations centre (SOC) teams with a view of both cloud and endpoint security events.
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
ThreatQuotient partners with Visa for payments safety
“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.”
Bitdefender expands offerings with RedSocks acquisition
RedSocks provides non-intrusive, real-time breach detection solutions and incident response services.
CyberArk launches privileged session management for cloud
An external attacker or malicious insider who is able to hijack these types of user credentials could shut down cloud environments.
Businesses unprepared for Windows 10 migration – survey
Respondents cited IT security and fears of being exposed to a cyber security vulnerability as two areas of concern.
Facebook breach: Ready for the coming phishing wave?
Much of the information accessed in the Facebook breach is perfect for cyber criminals planning their next phishing attack.
ManageEngine adds user behaviour analytics to ADAudit Plus
With its dynamic alert thresholds, ADAudit Plus reduces the number of false positives and buys ample time for security teams to focus on the real indicators of compromise.
Huge vulnerabilities in software supply chain being exploited
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
SD-WAN deployments up, but networking and security challenges persist
The report, commissioned by Barracuda Networks, includes data from more than 900 respondents in the Americas, EMEA, and APAC.
Frost and Sullivan recognises ForeScout’s achievements in NAC
ForeScout Technologies has announced it is the recipient of the Frost and Sullivan Growth Excellence Leadership Award in the network access control (NAC) market.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
GDPR compliance: Looking beyond the hype
With contrasting advice coming from all angles, the line between GDPR fact and fiction has become blurred.
Gartner’s top 10 tech trends for 2019
Gartner has released a list of what it sees as the most important strategic tech trends to be aware of in the quickly upcoming year.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
4 tips to keep safe when phishing for treats this Halloween
Jason Howells shares Barracuda MSP's top four tips to protect your business and help identify a phishing scam from a mile away.
2018’s worst malware revealed in report
Webroot has highlighted the top cyberattacks of 2018 in its latest Nastiest Malware list, which showcases the malware and attack payloads that have been most detrimental to organisations.
Trend Micro rebrands endpoint security offering
Trend Micro Apex One aims to redefine endpoint security with consistency across SaaS and on-premises deployments.
How phishing is evolving to outpace awareness
While email providers have made strides in flagging suspicious emails and source domains, reducing the effectiveness of attacks, attackers’ techniques have also evolved.
Opinion: Looking beyond traditional security for HCI
Bitdefender's senior analyst says simplicity makes hyperconverged infrastructure attractive, but as the data centre landscape changes, its essential the tech surrounding it evolves too.
It's official: Microsoft now owns GitHub
The US$7.5 billion deal brings Microsoft closer to the heart of developer communities; with new CEO Nat Friedman replacing former GitHub CEO and co-founder Chris Wanstrath.
How to effectively implement a software-defined secure network
The unified SDSN platform combines policy, detection, and enforcement with a comprehensive product portfolio.
Is blockchain a solution to IoT security problems?
Could using blockchain to trace and authenticate IoT data, regardless of what that data is be the answer to the problems plaguing the Internet of Things?
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
GDPR compliance: A step-by-step guide
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
Security cameras – a latent botnet network?
In a comparison of 16 indoor and outdoor IP surveillance cameras, researchers found only one well-protected device.
Security tips for SMBs moving to the cloud
"SMBs moving to the cloud should assess and prepare for the changes this will bring to their existing security infrastructure."
SailPoint improves security and compliance with SaaS update
New in IdentityNow is the Dynamic Discovery Engine, which allows users to easily and quickly create policies, access reviews, dashboards and reporting.