• Featured more »

  • From law to cyber security

    From law to cyber security

    With Rachael Falk – Director of Technology, Security & Strategy at .au Domain Administration Ltd Rachael practiced as a lawyer in Australian and overseas law firms before commencing with Telstra. Moving from legal to cyber security, Rachael had several roles in Telstra Security Operations, including National Security Advisor. Now in a new executive position, Rachael has […]

  • The Chinese New Year heist

    The Chinese New Year heist

    A traditional Chinese New Year celebration with volumes of ‘prosperity and good luck’ money gifts, asynchronous working days across 2 time zones, procedural and regulatory vulnerabilities, straight-through automated processing – these were among the elements that contributed to delays in detecting and responding to the Bangladesh Central Bank cyber break-in, and allowed sophisticated well-organized criminals […]

  • Tech Time more »

  • SolarWinds Database Performance Analyzer with Support for Microsoft Azure SQL Database Now Available in the Microsoft Azure Marketplace

    SolarWinds Database Performance Analyzer with Support for Microsoft Azure SQL Database Now Available in the Microsoft Azure Marketplace

    Azure SQL Database users can now benefit from Multi-Dimensional Performance Analysis with simplified deployment SolarWinds has announced the availability of SolarWinds Database Performance Analyzer with support for Microsoft Azure SQL Database in the Azure Marketplace. SolarWinds Database Performance Analyzer delivers deep visibility into the performance of top database platforms, including Microsoft SQL Server 2016, and provides advice for optimization and tuning to […]

  • Hitachi Expands Relationship with SAP to offer SAP HANA

    Hitachi Expands Relationship with SAP to offer SAP HANA

    Enterprise Cloud service and Accelerate Customers’ Journey to SAP HANA Hitachi has concluded an agreement with SAP to be a supplier for the SAP HANA Enterprise Cloud. This agreement builds on Hitachi’s long-standing strategic alliance with SAP. Under the terms of the agreement, Hitachi and oXya, a Hitachi Group company and a leading SAP-certified provider of […]

  • Frontline Security more »

  • Pawn Storm Targets French and German Politics

    Pawn Storm Targets French and German Politics

    Trend Micro has released its latest research report on the activity of Pawn Storm (aka APT28 and Fancy Bear), an active cyber espionage group that targets the global defence industry and politicians, among others. The report exposes how the group targets and attacks individuals in high value organisations using sophisticated socially engineered phishing emails. Pawn […]

  • China/Aus CyberSec agreement "tacit acknowledgement" of theft levels; could make Australian firms less safe

    China/Aus CyberSec agreement “tacit acknowledgement” of theft levels; could make Australian firms less safe

    Here is a statement from Tim Wellsmore, the Director of Threat Intelligence, Asia Pacific at FireEye on the recently announced pact between Australia and China to enhance cybersecurity cooperation: This China-Australia agreement is good news for Australia, but not because it stops China from hacking to steal intellectual property. It’s good news because it’s a […]

  • Other Recent Articles

  • Ixia Expands Visibility Portfolio to Support Micro to Hyperscale Data Centres

    Ixia Expands Visibility Portfolio to Support Micro to Hyperscale Data Centres

    Ixia has announced it has expanded the company’s growing visibility portfolio of Vision network packet brokers (NPBs) with Vision Edge 40 (10/40G platform) and Vision Edge 100 (100G platform). These new cost-effective and scalable solutions help IT teams supporting hyperscale and microscale data centres, resolve application performance bottlenecks, trouble shoot problems, and improve data centre automation, […]

  • McAfee Showcases Increased Commitment to Cyber Threat Research with Shamoon Revelations

    McAfee Showcases Increased Commitment to Cyber Threat Research with Shamoon Revelations

    McAfee Links Series of Shamoon Malware Campaigns Targeting Saudi Arabia; Suggests One Common Actor Behind Attacks NEWS HIGHLIGHTS McAfee to invest more in investigation of the technology and tactics of the latest cyberwarfare and cybercrime campaigns McAfee discloses detailed analysis of the evolution of Shamoon malware campaigns from 2012 attacks to 2016 and 2017 campaigns Commonalities […]

  • Senstar Introduces The Flare Real-Time Locating System

    Senstar Introduces The Flare Real-Time Locating System

    Patented RF technology helps to keep staff safe in high threat environments Senstar has introduced the next generation of the Flare Real-Time Locating System which instantly identifies and locates personal duress alarms at the touch of a button. Designed for reliability in institutional and industrial environments, Flare uses patented, proven, cost-effective technology to help keep staff […]

  • Malwarebytes Integrates with ForeScout to Deliver Real-Time Threat Visibility and Remediation

    Malwarebytes Integrates with ForeScout to Deliver Real-Time Threat Visibility and Remediation

    Malwarebytes has announced an integration with ForeScout Technologies to provide joint customers real-time threat visibility and remediation for both managed and unmanaged devices. The vast majority of today’s attacks occur in just minutes, with the bulk of subsequent data theft beginning within seconds following a breach. Malicious attackers have dozens of tools, techniques and attack vectors […]