Lenovo DCG taps former TPG channel boss
Lenovo Data Centre Group has appointed Kyle Bunting as its head of enterprise sales for Australia and New Zealand.
View ArticleMobileIron wants partners to join in its zero sign on journey
Mobility security vendor MobileIron has just embarked on a zero trust zero sign on journey and has been working with local partners that want to embark on this journey.
View ArticleHP to cut up to 9,000 jobs in global restructure
HP has announced a restructure plan that will see its global headcount reduced by up to 9,000 employees.
View ArticleHPE wants a more diverse pipeline of top management
HPE has launched its Women's Leadership Network in Australia to help support and encourage women.
View ArticleKaspersky opens threat intelligence portal to public
Kaspersky has opened its threat intelligence portal to the general public with the intention of targeting incident responders and security operation centre (SOC) analysts, working in-house and at...
View ArticlePreviously undocumented backdoor targets Microsoft’s Equation Editor
RoyalRoad backdoor delivered via spear phishing was identified in an attack on a Russian-based defence contractor.
View ArticleHow to create a digital workplace
Creating a digital work environment for employees, regardless of where they are physically, involves much more than handing out laptops, turning to cloud apps and using a VPN.
View ArticleUnited Nations launches global standard for AI ethics
Standard aims to provide AI with a strong ethical basis that will not only protect but also promote human rights and human dignity.
View Article--- Article Not Found! ---
*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***
View Article--- Article Not Found! ---
*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***
View ArticleServiceNow to detect open source security vulnerabilities with Snyk integration
ServiceNow Vulnerability Response users will now have access to Snyk’s product that scans open source code during the development process.
View ArticleBackdoor deployment overtakes ransomware as top attacker action
Thanks to the availability of malware such as Emotet, deploying backdoors on victims' networks is becoming easier and more lucrative for cyber criminals.
View ArticleDXC Technology says global network is not compromised following Latitude...
IT services provider DXC sparked questions after quietly publishing a note that its networks were not compromised following the Latitude Financial breach.
View ArticleCyberArk’s enterprise browser promises zero-trust support, policy management
The identity security vendor is set to launch an enterprise browser in response to increasing post-MFA attacks on session cookies.
View ArticleGoogle Cloud launches Cryptomining Protection Program
Google Cloud Cryptomining Protection Program is part of the Security Command Center Premium service to help users detect cryptomining attacks.
View Article
More Pages to Explore .....