IT Brief Asia - Technology news for CIOs & IT decision-makers

Security stories - Page 2

Story image
Video: 10 Minute IT Jams - An update from Coevolve
Mon, 22nd Aug 2022
#
network management
#
network infrastructure
#
sd-wan
Today we are joined by co-founder and CTO of Coevolve Ciaran Roche, for a special SD-WAN feature week presentation.
Story image
Bitdefender finds malicious campaign active on Google Play
Fri, 19th Aug 2022
#
smartphones
#
technology gifts
#
malicious app downloads
Bitdefender has released research about a new Google Play campaign that bypasses the storefront's security checks to deliver potentially malicious content and advertisements.
Story image
The five key pillars that support effective cloud architecture
Fri, 19th Aug 2022
#
cloud
#
security
#
lucid software
Lucid explains why cost optimisation, realiability, operational excellence, performance efficiency and security are so important for effective cloud architecture.
Story image
Secureworks CTU uncovers new information about DarkTortilla malware
Thu, 18th Aug 2022
#
malware
#
cybersecurity
#
breach prevention
Secureworks CTU researchers have found new information about the DarkTortilla malware, revealing more about its versatility and scope within the threat landscape.
Story image
Fortinet attributes Gartner-reported growth to ZTNA approach
Wed, 17th Aug 2022
#
malware
#
firewall
#
network management
Zero-trust is slowly becoming a dominant enterprise security strategy for businesses, and the Gartner report highlights that although prominent, it is often underutilised.
Story image
Benefits vs risks of facial recognition technology
Wed, 17th Aug 2022
#
surveillance
#
biometrics
#
facial recognition
Once a distant, futuristic concept, facial recognition technology is now found in many technological applications with a variety of different functions. 
Story image
Safeguarding your financial data
Tue, 16th Aug 2022
#
data protection
#
finance, leasing & rental
#
cybersecurity
As the digital revolution marches on, managing data security has never been more important. Here are five important steps to take toward better financial data security.
Story image
Concentric AI protects sensitive data with new capabilities
Tue, 16th Aug 2022
#
bi
#
big data
#
data analytics
The new capability reveals sensitive data shared across email and business messaging platforms and highlights who has inappropriate access to content.
Story image
Demand grows for future-proof mobile access solutions
Tue, 16th Aug 2022
#
smartphones
#
hid global
#
report
HID Global, in partnership with IFSEC Global, recently released the 2022 State of Physical Access Control report for the fourth year running.
Story image
Federated change is the best path to digital evolution
Tue, 16th Aug 2022
#
bi
#
big data
#
data analytics
Businesses that can successfully manage the exponentially expanding masses of data produced by modern consumers will be the businesses that survive and prosper.
Story image
Avast reveals zero-day exploits targeting Chrome and Microsoft
Fri, 12th Aug 2022
#
malware
#
ransomware
#
microsoft
Avast, released its Q2/2022 Threat Report today, revealing a significant increase in global ransomware attacks, up 24% from Q1/2022.
Story image
Why printing security plays a vital part in keeping Aotearoa safe
Fri, 12th Aug 2022
#
cloud
#
printing
#
hp
While internet printing, mobile printing and other similar technologies have no doubt made things easier to manage, it has also brought a whole new set of problems to the table.
Story image
Gartner names Lookout a Visionary in 2022 Magic Quadrant
Thu, 11th Aug 2022
#
casb
#
dlp
#
ueba
Gartner has recognised Lookout as a Visionary in the 2022 Magic Quadrant for Security Service Edge (SSE) and one of the top three offerings in the 2022 Gartner Critical Capabilities for SSE report.
Story image
Classiscam threat expands to target leading platforms in Singapore
Thu, 11th Aug 2022
#
finance, leasing & rental
#
fraud
#
advertising
Researchers at Group-IB have uncovered that Classiscam, a sophisticated scam-as-a-service operation, has expanded to Singapore.
Story image
Hands-on review: Arlo Go 2 security camera
Thu, 11th Aug 2022
#
gaming
#
reviews
#
partner programmes
In my humble opinion, Arlo Go 2 offers security for anyone needing to keep a remote eye on prized possessions or premises at different locations.
Story image
PMT Security awarded sole Australian distribution rights to SmokeCloak
Tue, 9th Aug 2022
#
partner programmes
#
physical security
#
it distributors
PMT Security will soon become the sole distributor of SmokeCloak in Australia, with the company being awarded the exclusive rights to represent the SmokeCloak brand.
Story image
Research shows attacks on the gaming industry are getting worse
Mon, 8th Aug 2022
#
gaming
#
ddos
#
malware
Web application attacks in the gaming sector have grown by 167% from Q1 2021 to Q1 2022, according to new research from Akamai.
Story image
Norton research finds NZ threat landscape diversifying on social media
Fri, 5th Aug 2022
#
email security
#
phishing
#
norton
Norton's quarterly report has highlighted the seriousness of the threat landscape in New Zealand.
Story image
Video: 10 Minute IT Jams - An update from SearchInform
Fri, 5th Aug 2022
#
cloud
#
data protection
#
it infrastructure
Alexey Pinchuk joins us today to discuss the role the company plays in helping organisations manage risk and provide better security outcomes.
Story image
Security gaps in APIs plague organisations - study
Thu, 4th Aug 2022
#
cloud
#
devops
#
attack
Together, the findings highlight that existing solutions and API security tactics focused on shift-left strategies are failing to adequately protect APIs.
Story image
Microsoft unveils two new security products to help reduce attack surfaces
Thu, 4th Aug 2022
#
malware
#
microsoft
#
ransomware
The products are set to give companies deeper insights into threat actor activity and help them successfully navigate the changing threat landscape.
Story image
SOTI research explores professional's thoughts on digitisation in the healthcare sector
Wed, 3rd Aug 2022
#
cloud
#
bi
#
big data
Interconnectivity, automation and data management were the three key trends highlighted in the report as integral parts of successful medical technology implementation.
Story image
Good or bad - answer these questions to check application visibility
Tue, 2nd Aug 2022
#
cloud
#
bi
#
big data
With the adoption of the hybrid cloud, applications now run in multiple private and public cloud environments managed by different teams and tools.
Story image
Why security needs to shape your journey to the cloud
Tue, 2nd Aug 2022
#
cloud
#
iaas
#
compliance
It's estimated that 80% of workloads could be in the cloud in the next few years. How can you make all that data secure?
© 2023 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.