TechDay Asia - Asia's technology news network
Asia
Search

Threat Landscape stories - Page 52

Story image
How a virtual CISO can become part of a managed security regime
Mon, 13th May 2019
#
mssp
#
cso / ciso
#
ncc group
Organisations are turning to virtual CISOs as part of managed security services to enhance cybersecurity strategies affordably and effectively. Here’s how.
Story image
Firewall best practices to block ransomware - Sophos
Fri, 10th May 2019
#
malware
#
firewalls
#
network infrastructure
Companies can’t see what’s happening on their endpoint devices, leaving them struggling to prevent attacks or even knowing how and when they happened.
Story image
Forcepoint 2019 APAC Channel Partner Award winners announced
Fri, 10th May 2019
#
casb
#
partner programmes
#
forcepoint
The company recognized 9 partners across 6 categories based on criteria including overall revenue performance and new business growth secured in 2018.
Story image
Why it’s time for organisations to rethink their cybersecurity strategy
Wed, 8th May 2019
#
phishing
#
email security
#
cybersecurity
Proofpoint says commonly targeted accounts are not necessarily people who are known or actively tracked by the security team.
Story image
Paranoid Android? Examining three key trends in Android malware
Wed, 8th May 2019
#
smartphones
#
ddos
#
wireless networks
It definitely doesn’t mean you are paranoid if you’re worried about Android security:  the threat landscape is growing in every dimension.
Story image
Kaspersky Lab signs on Dicker Data for ANZ
Wed, 8th May 2019
#
endpoint protection
#
edr
#
cybersecurity
Kaspersky Lab ANZ and Dicker Data team up to drive cybersecurity solutions to Australian and New Zealand mid-market, SMB, and enterprise customers.
Story image
14 partner and customer reactions to Red Hat's Enterprise Linux 8 announcement
Wed, 8th May 2019
#
devops
#
apm
#
open source
Enterprise Linux 8 from Red Hat gets a warm reception from industry giants like Google Cloud, IBM, and Microsoft. Here's what partners and customers are saying.
Story image
Trustwave brings database security scanning to the cloud
Thu, 2nd May 2019
#
cloud security
#
cybersecurity
#
trustwave
Trustwave debuts DbProtect to shield databases against cyber threats, enhancing security across cloud platforms.
Story image
LogRhythm SIEM named Gartner Customer Choice
Wed, 1st May 2019
#
cybersecurity
#
siem
#
logrhythm
This is the third consecutive time LogRhythm been recognised as a Customers’ Choice, which is determined based on independently verified feedback and ratings.
Story image
SecureWorks speeds up threat detection through analytics
Tue, 30th Apr 2019
#
data analytics
#
endpoint protection
#
martech
SecureWorks has embraced software-as-a-service (SaaS) to protect customers and transform the detect-investigate-respond process towards cyber threats.
Story image
Cyber threats progressing as defenses evolve - Trustwave
Mon, 29th Apr 2019
#
cybersecurity
#
social engineering
#
report
Trustwave's 2019 Global Security Report reveals a sharp rise in focused cyber threats and highlights the ongoing evolution of both attacks and defences.
Story image
emt Distribution adds risk intelligence vendor
Wed, 24th Apr 2019
#
martech
#
data analytics
#
planning
Flashpoint has signed emt Distribution to provide channel partners in Oceania and South East Asia a solution for illicit threat actor communities.
Story image
CrowdStrike: Improving network security with cloud computing solutions
Wed, 24th Apr 2019
#
firewalls
#
ddos
#
network infrastructure
Australian spending on public cloud services is expected to reach $6.5 billion this year according to Gartner.
Story image
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Thu, 18th Apr 2019
#
martech
#
data analytics
#
planning
Faced with an overload of 'critical' vulnerabilities, Tenable turns to predictive solutions, launching a tool that targets the top 3% of likely exploits.
Story image
Fortinet's bid to close the cyber skills gap
Fri, 12th Apr 2019
#
firewalls
#
network infrastructure
#
network security
A comprehensive training and education strategy must include strategic partnerships within government, academia and NGOs.
Story image
Aura Infosec discovers major Mozilla Firefox vulnerability
Wed, 10th Apr 2019
#
cybersecurity
#
security vulnerabilities
#
firefox
Alex Nikolova made the discovery while conducting a research project on the same-origin policy of various web browsers.
Story image
AI-driven security is no longer optional: 'It's a requirement'
Tue, 2nd Apr 2019
#
smartphones
#
ai security
#
ai
Artificial intelligence (AI) is increasingly seen as the key to improved cybersecurity, according to a study by BlackBerry Cylance.
Story image
BYOD can be secure with the right measures
Mon, 25th Mar 2019
#
endpoint protection
#
mfa
#
dlp
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Story image
Developing APAC countries most vulnerable to malware - Microsoft
Fri, 22nd Mar 2019
#
malware
#
ransomware
#
cybersecurity
The Asia-Pacific region remains a prime target for cybercriminals, according to Microsoft's Security Intelligence Report.
Story image
How business leaders must prioritise cyber risk - Palo Alto Networks
Wed, 13th Mar 2019
#
firewalls
#
network infrastructure
#
network security
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.