Security

Hewlett Packard Enterprise Turbocharges Application Delivery with New Analytics Suite
HPE AppPulse Suite leverages agile and lean methodologies and big data analytics to help developers…

Carbon Black and IBM Security partner to enable businesses to protect against and respond faster to cyber attacks
Carbon Black and IBM Security have announced a partnership to give businesses a more simplified and…

RSA Research Reveals Blind Spots in Threat Detection
Only 24% of organisations are satisfied with their detection and investigation capabilities STORY HIGHLIGHTS Speed…

Centrify launches ‘MFA Everywhere’ initiative to secure enterprise identities against compromised credentials
Centrify’s MFA Everywhere provides turnkey, adaptive Multi-Factor Authentication (MFA) across the enterprise in Australia and…

ManageEngine Launches Privileged Identity Management Solution for SSH Keys
Key Manager Plus Centralises Control of SSH Keys, Provides Visibility into SSH Environment, Regulates Privileged…

BDO bolsters Risk Advisory team to help Australian organisations tackle cyber security risks
The critical focus of many Australian organisations on maintaining current awareness and defending themselves against…

Survey: 82% of Boards Are Concerned about Cybersecurity, Yet Just 1 in 7 Security Chiefs Reports Directly to CEO
ISACA / RSA Conference survey shows that cybersecurity is still seen as a technology issue,…

Dell Security Multi-Engine Approach Advances Sandboxing Beyond Threat Detection to Complete Prevention with New SonicWALL Capture Advanced Threat Protection (ATP) Service
Industry-first, multi-engine approach to advanced threat analysis—that also supports prevention—delivers critical layer of defence to…

Government-Industry Partnership Drives Innovation and Secures Defence Jobs
Lockheed Martin Australia has been supporting the Jindalee Operational Radar Network (JORN) since 2003. The…

UL extends mobile product portfolio with Test Tools for M2M
UL is pleased to announce the release of two new test tools for Machine-to-Machine (M2M)…

Zika virus outbreak concerns used to spread malware
On February 1, 2016, the World Health Organization (WHO) declared a Public Health Emergency of…

Research: Cyber extortion attacks on the rise – Mandiant M-Trends Report
FireEye has released the 2016 Mandiant M-Trends Report which reviews cyberattacks it has responded to…

WatchGuard Delivers High-Speed, Modular UTM Appliance
Firebox M4600 and M5600 provide distributed enterprises with security, speed, and flexibility WatchGuard Technologies has announced the…

The Advanced Threat Platform that Connects Attacks Across the Internet with Internal Enterprise Networks
Empowering security teams to find and prove active attack campaigns 10x more effectively than SIEM…