Security Posture stories
As the software development process has evolved in recent years, the approach taken to security has had to change.
As cloud-based operations' security challenges mount, businesses are urged to employ virtual firewalls, crucial for preserving data integrity, enforcing compliance and retaining customer trust.
Celebrating its first successful year, Object First witnesses a 200% surge in bookings for its ransomware-proof backup storage appliance, Ootbi, expanding into the EMEA and LATAM markets.
Zscaler has launched advanced single-vendor Secure Access Service Edge programme and Zero Trust SD-WAN solution.
Logpoint's new Business Critical Security solution arms organisations with enhanced cloud security features for the SAP Business Technology Platform.
security innovations have the potential to keep pace with the expanding attack surface and enable SecOps and IT to work together and successfully secure the enterprise.
Frost and Sullivan has recognised Check Point Software Technologies as a Leader and Innovator in Cloud Security.
Despite 83% of cybersec decision-makers in Australia and New Zealand seeing Zero Trust Network Access as future security, 17% have yet to start a programme, Forrester Consulting study reveals.
AppOmni experts predict perilous 2024: AI misuse, chronic mega breaches, and new cyber weaponry loom large.
Egress forecasts AI-powered cyber threats to soar in 2024, with cybercriminals exploiting artificial intelligence.
businesses must adapt by strengthening their security protocols and empowering CISOs to lead the charge in fortifying their organisation's cybersecurity resilience.
We suggest you make the following three resolutions and a promise to yourself that you will lay the groundwork to make them happen in 2024.
By deploying effective and automated processes and then managing them, IT leaders can ensure their organisation enjoys the best possible outcomes.
Too often, organisations get serious about modernising their security posture only after they've had a breach.
Cybersecurity professionals must translate their technical language to ensure board members fully grasp inherent cyber threats, to encourage informed investment and more accountable cybercrime prevention.
Organisations face technical barriers in the push for IT improvement and new security methods, yet the rising importance of non-technical factors in technology procurement may aid transformation.
AI-driven threat actors' sophistication surge, increased data privacy concerns, and deepening supply chain security issues shape the cloud security landscape in 2024, experts forecast.
New Zealand's cybersecurity expenditure could boost as Rapid7 appoints Duo, a branch of Sektor, for strategic distribution.
CISOs are relying on reactive strategies post-breach rather than proactive measures that better prepare the whole team before an incident strikes.
US firm Action1 enters the European market, launching a new data centre in Frankfurt, placing emphasis on GDPR compliance.