Cyber security vendors respond to invasion of Ukraine
Since Russia launched a full-scale military invasion into Ukraine on February 23, a series of cyber attacks have been detected targeting Ukraine.
Since Russia launched a full-scale military invasion into Ukraine on February 23, a series of cyber attacks have been detected targeting Ukraine.
A claimed first-of-a-kind quantum key distribution network offers 800 Gbps encryption under real-world environmental conditions.
New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions.
SAP ICM vulnerability allows theft of credentials and session information, which can be used to launch ransomware and steal sensitive data.
A new report discovers edge network definitions are in flux across industries as organisations look to augment traditional security controls to address edge network risks.
The vulnerability permits malicious interference in the SAP change management and software deployment processes. SAP issues patch to protect file system from exploitation.
Researchers warn of critical Java flaw impacting the console of the H2 Java SQL database, advising users to update to mitigate remote code execution risk.
The fall-out from the Apache Log4j vulnerability continues as researchers discover a second exploit that could lead to denial-of-service attacks.
New joint solution enhances ability to predict, detect, and respond to cyber attacks at scale across endpoints, networks, identities, cloud, and workspaces.
A new sideloading malware campaign targeting Windows uses phishing and social engineering tactics that can be difficult for users to spot.
Domain registrar GoDaddy recently announced a data breach impacting 1.2 million customers via its Managed WordPress hosting environment.
Virtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement it.
New certification aims to validate knowledge of foundational cyber security concepts and best practices to address skills gap.
If businesses have no choice but to pay attackers, these best practices could put users in the best position to recover from a ransomware attack.
These cyber security buzzwords are inaccurate, outdated, misleading, or even harmful. Here's why they should be laid to rest.
EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.
ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
By Adam LePeilbet, Senior Director & General Manager, Data Centre Sales, Dell Technologies, ANZ