Specialist data centre news for Europe, the Middle East & Africa
These search results are from across the Techday network of sites
Network security providers dominate cybersecurity - Canalys
Cisco, Palo Alto Networks and Fortinet, all with a strong focus on network security products, outperformed the market, recording strong double-digit growth.
85% of organisations struggling with access management – Thycotic
More than 50% of the organisations surveyed said privileged accounts never expire or get deprovisioned.
Organisations putting stronger focus on data encryption – report
Cloud data protection requirements continue to drive encryption use, with encryption across both public and private cloud use cases growing over 2018 levels
89% of Australian businesses breached last year – Carbon Black
The report analyses survey results from different industries, organisation sizes and IT team sizes.
Malware and malicious insiders account for a third cybercrime costs
“Security is everyone’s responsibility and it’s time for a more holistic and preventative approach to cyber risk management."
Users choosing more competitive fibre deals – report
The summer season was all about fibre with 74% of respondents choosing fibre broadband plans, an increase of 6% on last quarter’s report.
Largest DDoS-for-hire websites responsible for 11% of attacks worldwide – Nexusguard
The FBI’s shutdown of the world’s 15 largest DDoS-for-hire “booter” websites in December resulted in 85% decrease in average attack sizes, year-over year.
Security top priority for Filipinos when choosing a bank - Unisys
Filipinos have greatest appetite in Asia Pacific to use biometrics to access banking services
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Aussies too lax about IoT security - McAfee
Aussie consumers are at a loss when it comes to securing the increasing number of connected devices in their homes and are often opting to take no action at all.
Rapid7 reveals cybersecurity gaps within ASX 200 organisations
Even the most mature and well-resourced ASX 200 organisations have trouble sufficiently deploying cybersecurity basics.
Cybercriminals earning over $3billion annually exploiting social platforms
Social media platforms contain up to 20% more methods by which malware can be delivered to users – e.g. through adverts, shares, plug-ins – than comparable sources.
Equality a powerful multiplier of workplace innovation - Accenture
Accenture research found that employees’ willingness and ability to innovate is nearly five times higher in companies with a robust culture of equality.
Verizon report spotlights mitigating insider threats
Companies are too often hesitant to recognise, report or take action against employees who have become a threat to their organisation.
Built-in email security measures inadequate - Trend Micro
The Cloud App Security report details how escalating email threat levels are exposing organisations to an increased risk of fraud, spying, information theft, and spoofing.
IBM Security: Cybercriminals focusing on cryptojacking
The report found that more than half of cybercriminal attacks pivot away from malware-based attacks.
New threats on the block: Formjacking, IoT, LotL attacks
Symantec's report provides an overview of the threat landscape, including insights into global threat activity, cyber criminal trends, and motivations for attackers.
Why Australian employees are more digitally mature than their organisations
The enterprise is entering a new “post-digital” era, where success will be based on an organisation’s ability to master a set of new technologies.
How IBM’s acquisition of Red Hat could impact your business
The acquisition is pending regulatory approval, but IBM expects the deal to close in the second half of 2019.
How automation can eliminate financial errors
Nearly all C-level respondents agreed that if inaccuracies in financial data were not identified prior to reporting, the impact would be negative.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Why visibility is a top concern in digital transformation initiatives
"Digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes."