Technology

IPSec Guard service brings 24/7 information security monitoring to businesses of all sizes
Around the clock Security Operations Centre powered by LogRhythm Australian organisations of all sizes can…

AISA Focus Groups – Notification of Serious Data Breaches
For AISA Members, In February we will have a special workshop across 4 branches that…

Hewlett Packard Enterprise and Microsoft Deepen Collaboration on Windows 10 Offerings – Announce Cloud Productivity and Mobility Solution Offerings (CPM)
Partnership creates industry leading solutions to accelerate enterprise transformation and drive customer satisfaction Hewlett Packard…

Cylance Positioned as a Visionary in the 2016 Gartner Magic Quadrant for Endpoint Protection Platforms
Positioned Furthest for Completeness of Vision in the Visionaries Quadrant Cylance, the company that is…

CyberArk Delivers Cloud-Based Privileged Account Security to the Endpoint
CyberArk Viewfinity Integrates Privilege Management with Application Control to Help Protect Against Malware-Based Attacks Without…

As Demand for Information Security Professionals Grows, ISACA Credential Reaches Major Milestone
The demand for IT security personnel remains high in 2016, according to ISACA’s January 2016…

ESET’s 2016 Cybercrime Trends and predictions report
ESET, a global pioneer in proactive protection for 25-years, has released its ‘Trends 2016: (In)Security…

SimpliVity unleashes new programs and initiatives to help partners harness hyperconvergence demand
SimpliVity has announced new PartnerAdvantage programs and initiatives to deliver robust opportunities and strategic enablement to…

Despite Stagnant Enterprise Software Budgets, Waste Is Running Rampant According to New Flexera Software Report
Most organisations have shelfware, most are out of compliance with their software contracts, and most…

Tenable Network Security Supports Microsoft Azure, Securing Cloud Environments at the Speed of DevOps
Leading developer of next-generation cybersecurity software now provides enhanced security visibility across three major cloud…

Arbor Networks 11th Finds Relentless Threat Environment Driving Demand for Managed Security Services and Incident Response Support
Arbor Networks Inc., the security division of NETSCOUT, has released its 11th Annual Worldwide Infrastructure Security…

1 in 10 broadly shared files in cloud apps expose sensitive and regulated data, reveals new Elastica cloud threat labs report from Blue Coat
Enterprise shadow data threat on rise as cloud app usage surges in the enterprise, opening…

ISACA’s Cybersecurity Nexus Launches Tools to Help Cyber Pros Identify Controls and Navigate Their Careers
ISACA has launched two free digital tools through its Cybersecurity Nexus (CSX): Cybersecurity Career Road…

Testing demonstrates that Ixia Network Packet Broker delivers 100 percent packet processing for 100 percent network visibility
Ixia has announced the processing performance results of an Ixia-sponsored test conducted by the Tolly Group…