SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

About Sara

Sara Barker mugshot photo
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
FYI, this is an ex-employee of TechDay.

Stories by Sara - Page 132

Story image
AU Govt warned to take hard look in mirror after UK 'Snooper's Charter' ruled illegal
Thu, 1st Feb 2018
#
surveillance
#
law
#
digital rights watch
This week the UK Court of Appeal ruled that surveillance under the UK Data Retention and Investigatory Powers Act was illegal.
Story image
Malwarebytes CEO 'heartbroken' after botched program updates cause RAM spikes
Thu, 1st Feb 2018
#
malware
#
cybersecurity
#
web filtering
Malwarebytes urges its customers to update their software after a botched update last Saturday caused massive memory spikes & computer crashes.
Story image
Fool me once... ransomware strikes firms twice on average, survey finds
Thu, 1st Feb 2018
#
malware
#
firewalls
#
network infrastructure
Ransomware hits firms twice on average, according to a Sophos survey. Despite the presence of endpoint security, 77% of attacks breach defences.
Story image
Fujitsu rolls out Biometrics-as-a-Service to Australian enterprises
Thu, 1st Feb 2018
#
biometrics
#
mfa
#
fujitsu
Fujitsu's cloud-based multimodal biometrics-as-a-service solution will enable Australian organisations to deploy biometric authentication.
Story image
Sophos' Intercept X dives into deep learning for security
Thu, 1st Feb 2018
#
firewalls
#
network infrastructure
#
network security
Next-generation endpoint security provider Sophos is taking advanced deep learning neural networks to the fight against malware.
Story image
LogRhythm SIEM gets a boost with Webroot threat intelligence & IP reputation services
Wed, 31st Jan 2018
#
siem
#
ai security
#
ai
LogRhythm and Webroot partner to enhance SIEM intelligence with IP reputation and threat intelligence services.
Story image
'Urgent call to action' for ASEAN nations - improve cybersecurity or face losing $750b
Wed, 31st Jan 2018
#
malware
#
cybersecurity
#
cisco
A new report is rallying for ‘an urgent call to action’ for ASEAN nations, saying that a ‘radical agenda’ may help defend against cyber attacks.
Story image
2017 brought a surge of ransom & hijack attacks against APAC
Wed, 31st Jan 2018
#
malware
#
ransomware
#
cybersecurity
Asia Pacific is a hotspot for ransomware, hijackers, spyware and worms and one security expert believes that the region is becoming a major target.
Story image
NSW hacker to appear in court seven months after GoGet data breach
Wed, 31st Jan 2018
#
breach prevention
#
cybersecurity
#
data breach
Popular car sharing service GoGet has been hit by a massive data breach that may affect all users who joined prior to July 27, 2017.
Story image
Why the C-suite must not be exempt from cyber defense training
Wed, 31st Jan 2018
#
phishing
#
email security
#
breach prevention
Some C-suite executives do not think they need training or education to spot attacks because they don’t think they would ever fall for an attack.
Story image
Sydneysiders willing to use tech for reporting non-urgent crimes
Wed, 31st Jan 2018
#
surveillance
#
physical security
#
unisys
Sydneysiders are more than happy to become crime-stoppers, but only if their privacy is maintained in the process.
Story image
ThreatMetrix to merge with LexisNexis Risk Solutions after $1 billion buyout
Wed, 31st Jan 2018
#
risk & compliance
#
threatmetrix
#
lexisnexis
Global analytics provider RELX Group has paid £580 million (AU$1.01 billion) to buy out the entire issue share capital of ThreatMetrix.
Story image
From Dridex to Friedex: Malware creators dabble in ransomware
Wed, 31st Jan 2018
#
malware
#
ransomware
#
cybersecurity
The creators of the Dridex banking Trojan are also responsible for FriedEx (also known as BitPaymer), a ransomware that was discovered in mid-2017.
Story image
Kiwi company takes UC security to a multi-billion dollar toll fraud problem
Wed, 31st Jan 2018
#
uc
#
cybersecurity
#
avaya
A local Auckland company is vowing to put a dent in the billions of dollars lost to toll fraud across unified communications (UC) networks.
Story image
Gen2 to provide managed security services to NZ Government
Wed, 31st Jan 2018
#
mssp
#
nz government
#
gen2
Wellington-based managed security services provider Gen2 Security will provide services to the government’s TaaS panel.
Story image
Security professionals waste 10 hours every week because of poor software
Tue, 30th Jan 2018
#
siem
#
ai
#
logrhythm
Cybersecurity professionals could be wasting as many as 10 hours per week on tasks because of software that isn’t fit for the purpose.
Story image
Aruba awarded industry's first Common Criteria certification for NAC solution
Tue, 30th Jan 2018
#
firewalls
#
network security
#
breach prevention
National Information Assurance Partnership awards Aruba the cybersecurity industry's first Common Criteria certification for a network access control solution.
Story image
Biometrics vs passwords: How the generation gap is shaping workplace security
Tue, 30th Jan 2018
#
biometrics
#
passwords
#
ibm security
Millennials are moving beyond the world of passwords and quickly embracing biometrics, leaving the older generations to continue using passwords.
Story image
Ten things you need to know about Chronicle, Alphabet's new cybersecurity firm
Fri, 26th Jan 2018
#
cybersecurity
#
alphabet
#
founders
Alphabet has unveiled Chronicle, a new cybersecurity firm aimed at detecting and stopping attacks using advanced analytics and Google's vast infrastructure.
Story image
Okta report says security is changing workplace app use
Fri, 26th Jan 2018
#
mfa
#
passwords
#
okta
Okta's 2018 Businesses @ Work report, which found that seven of the 15 fastest-growing apps are security tools or have security use cases.