Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday network of sites
Claroty Platform updates include improved OT security controls
Claroty has released updates to its Claroty Platform in order to bring more operational technology (OT) security controls in a single solution.
VMware’s plan for intrinsic cloud security
Intrinsic security makes protecting critical applications and data more automated, proactive and pervasive across the entire distributed enterprise.
Malwarebytes enhances enterprise, channel cloud offerings
The company has launched an enhanced cloud platform and made its MSP partner programme generally available.
VMware: APAC CIOs will become key decision makers by 2025
The role of chief information officers in Asia Pacific and Japan will take a strategic turn by 2025, as they become directly responsible for business outcomes.
New code-signing solution released by Venafi
Machine identity protection solution secures code signing across organisations and guards against unauthorised use.
Apple gets serious about enterprise & security features
Features include new BYOD policies, managed Apple IDs, security enhancements, and even an app that allows users to find their phone or their friends.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.
How ERP can be used to boost business efficiency
"When an ERP solution runs major functions of a business resilience should be built into the technology."
Study: 80% of enterprises struggle to protect machine identities
The study focused on enterprise machine identity protection challenges and included responses from 350 senior IT security professionals.
NEXTGEN Distribution launches enterprise security practice
Paul Lancaster will head the newly-launched practice that will be built around the Micro Focus security portfolio
Fujitsu's first end-to-end service for network security
Fujitsu will offer total support for NIST SP800-171 compliant security measures...
Kiwi enterprise security software spend soars but basics still key
It's a growth market, but when it comes to security, doing the basics right has never been more important, Gartner's Sid Deshpande says.
Enterprise security: The hidden perils of ‘unguarded talk’
Some users will share information that seems innocuous, yet can be used by attackers in social engineering attacks. Here are some common examples.
The three Rs of enterprise security: Rotate, repave, and repair
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.
Selling enterprise security solutions - tips for success
Ingram Micro’s Andrew Khan shares proven sales strategies for demonstrating return on investment when pitching security solutions to NZ businesses.
Cyber security market set for a revenue revival
"The relatively high numbers of tech companies and mobile workers in APAC will drive strong growth on a relatively small revenue base in the region."
Workload scheduling software: the latest enterprise craze
Workload scheduling software is having its time to shine, as businesses look to increase efficiency and productivity.
SMEs need to up their security game or risk becoming a target
“It will be interesting to look at these numbers in a year’s time and see whether the SMEs are stepping up their security spend, and why."
Enterprise security trends for APAC
“This enormous explosion of connected devices and data will make it more challenging than ever to protect against cyberattacks."
Vulnerable system the root cause of security issues, experts say
The breadth of the problem illustrates the challenge faced by IT teams trying to protect their environment against security breaches.
Behavioural attack detection may be a saving grace for Aussie businesses
LightCyber has partnered with M.Tech to bring behavioural attack detection to the Australian market in response to the escalating data breach crisis.
Unmanaged wearables pose threat to the enterprise
“Wearables are deceptively private. However, hackers don’t need to take physical possession of a device in order to exploit a hole in security."
Enterprise security spend hits a speed bump
A dip in enterprise security spend growth is forecast for 2016 - thanks in part to a lack of high profile breaches last year.
The wonderful world of Enterprise 2.0
Web 2.0 is the term used to describe the second generation of the World Wide Web.