Security
Cyber Security Delegation to Israel-Open to all from Asia, Australia and New Zealand
The Australia Israel Chamber of Commerce (AICC) will host a cyber security trade delegation to…
ESET’s 2016 Cybercrime Trends and predictions report
ESET, a global pioneer in proactive protection for 25-years, has released its ‘Trends 2016: (In)Security…
SimpliVity unleashes new programs and initiatives to help partners harness hyperconvergence demand
SimpliVity has announced new PartnerAdvantage programs and initiatives to deliver robust opportunities and strategic enablement to…
Despite Stagnant Enterprise Software Budgets, Waste Is Running Rampant According to New Flexera Software Report
Most organisations have shelfware, most are out of compliance with their software contracts, and most…
Tenable Network Security Supports Microsoft Azure, Securing Cloud Environments at the Speed of DevOps
Leading developer of next-generation cybersecurity software now provides enhanced security visibility across three major cloud…
Arbor Networks 11th Finds Relentless Threat Environment Driving Demand for Managed Security Services and Incident Response Support
Arbor Networks Inc., the security division of NETSCOUT, has released its 11th Annual Worldwide Infrastructure Security…
1 in 10 broadly shared files in cloud apps expose sensitive and regulated data, reveals new Elastica cloud threat labs report from Blue Coat
Enterprise shadow data threat on rise as cloud app usage surges in the enterprise, opening…
ISACA’s Cybersecurity Nexus Launches Tools to Help Cyber Pros Identify Controls and Navigate Their Careers
ISACA has launched two free digital tools through its Cybersecurity Nexus (CSX): Cybersecurity Career Road…
Testing demonstrates that Ixia Network Packet Broker delivers 100 percent packet processing for 100 percent network visibility
Ixia has announced the processing performance results of an Ixia-sponsored test conducted by the Tolly Group…
Taking the Necessary Leap
Cyber security concerns continue to evolve rapidly, with new threats emerging every day. Cyber actors…
A Recipe to Reduce Mobile App Security Risk
As businesses roll-out their BYOD strategies, most CIOs and CEOs have no idea that many…
Securing Singapore’s Smart Nation
Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security…
In plain sight: Avoiding loss of visibility & security in virtualized environments
Network Packet Brokers are key to mitigating enterprise network blind spots – but unless chosen…
Unisys to Deliver Enterprise Security Innovation on the AWS Cloud
Award-winning Unisys Stealth technology delivers micro-segmentation on the Amazon Web Services Cloud for improved security,…