SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

About Sara

Sara Barker mugshot photo
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
FYI, this is an ex-employee of TechDay.

Stories by Sara - Page 184

Story image
Sophos launches new suite for cloud security and IoT management
Tue, 28th Feb 2017
#
uc
#
firewalls
#
network infrastructure
Sophos Mobile 7 is available now for on-site installation and will be available through cloud-based Sophos Central in mid-March 2017.
Story image
Cybercrime is the ‘new normal’ and organisations must adapt, says RSM Australia
Mon, 27th Feb 2017
#
breach prevention
#
cybersecurity
#
data breach
RSM Australia warns that cybercrime is now 'business as usual' for firms, reinforcing the need to fortify digital defences.
Story image
Cylance is now one of the top 50 companies leading the AI revolution
Mon, 27th Feb 2017
#
ai security
#
ai
#
cylance
AI security pioneers Cylance have been named one of Fortune Magazine’s ’50 companies leading the AI revolution'.
Story image
Could deception methods be the new answer to cybersecurity?
Mon, 27th Feb 2017
#
firewalls
#
network infrastructure
#
network security
Firms are unable to detect attackers for almost five months once they are inside systems, but deceiving attackers along the way can slow them down.
Story image
Switch vulnerabilities leave critical infrastructure networks wide open to attack
Mon, 27th Feb 2017
#
network infrastructure
#
cybersecurity
#
network switches
US Warns of Critical Vulnerabilities in Industrial Switches Used in Critical Infrastructure Sectors in Australia and New Zealand.
Story image
Hackers speak out: New study turns security stats on their head
Mon, 27th Feb 2017
#
endpoint protection
#
edr
#
hackers
The study confirms suspicions that attack methods are becoming ever more unique, with 50% of hackers changing their attack methods for every target.
Story image
Is your IT team experiencing alarm fatigue? Create a rapid response to cyber threats
Mon, 27th Feb 2017
#
siem
#
breach prevention
#
logrhythm
IT teams are experiencing 'alarm fatigue' and they are lagging behind. Here's how you can transform your teams to achieve rapid response.
Story image
Film review: Logan
Mon, 27th Feb 2017
#
gaming
#
reviews
#
digital entertainment
The sound in itself is visceral; this film is well worth seeing on the big screen for the aural experience alone.
Story image
Weekly Asia security roundup: Check Point, Mimecast, NEC and phishing attacks
Fri, 24th Feb 2017
#
digital signage
#
displays & projectors
#
mailguard
Phishing scams target Apple users as cybersecurity firms bolster Asia's digital defenses against growing threats.
Story image
Weekly AU security roundup: The Government, Mimecast, Acronis, ESET and CompTIA
Fri, 24th Feb 2017
#
malware
#
cybersecurity
#
acronis
Australia touts cybersecurity leadership, while players like Mimecast and Acronis spotlight key sector challenges and advances.
Story image
Sony Mobile unveils the Xperia X Compact, now available in New Zealand
Fri, 24th Feb 2017
#
smartphones
#
sony
#
technology gifts
Sony Mobile has revealed the availability and pricing of the Sony Xperia X Compact, the latest smartphone in the Xperia X series.
Story image
Global Switch secures new credit with HSBC for long-term data center finance
Fri, 24th Feb 2017
#
hyperscale
#
fintech
#
dc
Global Switch has now officially closed a new revolving credit facility with HSBC Bank, which will bring around S$768.4 million in financing.
Story image
Kiwi student bound for Amsterdam to help robots build bridges
Fri, 24th Feb 2017
#
auckland university
#
3d printing
#
volution
A young University of Auckland architectural graduate is set to take on Europe to use robots to build a pedestrian bridge over a canal.
Story image
Weekly NZ security roundup: 31c0n, cyber threats, Darknet and Mimecast
Fri, 24th Feb 2017
#
malware
#
firewalls
#
network infrastructure
NZ's cybersecurity scene is abuzz with 31c0n insights, stark cyber risks, Darknet exposés, and Mimecast's email defence revelations.
Story image
The 30 day MacBook Pro challenge: Can a Windows user become a Mac convert?
Fri, 24th Feb 2017
#
personal computing devices
#
apple
#
mobility
Can a Windows user be converted into an Apple fan in just thirty days? I play guinea pig and use the MacBook Pro for work - and for play.
Story image
Suprema ups biometric sensor game to provide ‘world’s fastest matching speed’
Thu, 23rd Feb 2017
#
biometrics
#
fingerprint scanners
Biometrics firm Suprema has launched BioSign 2.0, a mobile fingerprint authentication technology with unparalleled speed and accuracy.
Story image
Verizon & NTU to analyse attack impacts on Singapore's cybersecurity insurance industry
Thu, 23rd Feb 2017
#
cybersecurity insurance
#
risk & compliance
#
cybersecurity
Nanyang Technological University's Business School partners with Verizon to analyze the economic impact of cybersecurity incidents on global insurers.
Story image
NZ’s premier security conference 31c0n probes unanswered questions in two-day event
Thu, 23rd Feb 2017
#
cybersecurity
#
aura information security
#
partners
An intimate and devoted group of 160 security professionals have descended on the Viaduct Events Centre today as part of 31c0n.
Story image
Microsoft Cloud grows across Asia; Azure now available in Korea
Wed, 22nd Feb 2017
#
public cloud
#
microsoft
#
cloud services
Microsoft has announced that its Azure cloud platform is now available in new Microsoft Cloud platforms across Korea.
Story image
National University of Singapore ushers in country’s newest security research hub
Wed, 22nd Feb 2017
#
ddos
#
cybersecurity
#
national university of singapore
National University of Singapore’s National Cybersecurity R&D Laboratory is the latest facility to become a focal point for security research.