Device security stories
Cloudflare appoints Steve Bray as new Head of Australia & New Zealand
Cloudflare announces Steve Bray, former executive at Salesforce and Zendesk, as the new Head of Australia and New Zealand.
Security and compliance challenges remain across distributed workforces
The rise of remote work in post-COVID Australia brings both flexibility and cyber risks, driving a complex landscape for IT and security.
SOTI Solves Troubleshooting and Security Issues for Trek
Trek Bicycle Corporation has reported major improvements in operational efficiency after implementing the SOTI ONE Platform.
Jigsaw24 partners Kandji for device management solutions
Jigsaw24 partnered with Kandji for its next-generation platform that enables centrally securing and managing devices, in addition to its Apple-first focus.
Video: 10 Minute IT Jams - An update from Devicie
Martin McGregor, Co-Founder and CEO of Devicie, shares why the company was created, how it is helping its customers, and what we can expect from it next.
Hundreds of devices declared missing by government departments
The findings of 14 Freedom of Information (FOI) requests to the UK's government departments has been released.
27.5% CAGR for network access control market in 2022-32: FMI
The report by Future Market Insights states that the network access control market is expected to reach a valuation of US$27,409.4 million by the end of 2032.
71,000 customers served by Jamf in managing Apple devices
The company is now helping approximately 71,000 active customers succeed with Apple and is running on about 30 million devices worldwide.
Ordr improves security and management of connected devices
It has implemented more than 80 integrations within the Ordr Data Lake while adding security enhancements to accelerate zero trust segmentation.
Forescout reveals top vulnerabilities impacting OT vendors
Forescout’s Vedere Labs has disclosed OT: ICEFALL, naming 56 vulnerabilities affecting devices from 10 operational technology vendors.
How rugged devices can support organisations when the cloud goes out
Businesses are facing an increased risk from extreme weather events, making rugged devices vital in the case of a disaster.
As the threat landscape evolves, SASE security models may be the answer
Many organizations lack security solutions for remote employees, according to a new assessment by Check Point Software Technologies.
TXOne Networks secures industrial operations with latest release
TXOne Networks, a global provider of ICS and industrial IoT (IIoT) security, has launched a new edition of its portable security device.
The long-tail of COVID-19 and the evolution of ransomware
The long-tail of COVID-19 means security teams are having to deal with user sprawl and device sprawl, causing big headaches in 2022.
Samsung outlines cybersecurity strategy for devices
Samsung is tackling the rise in cyberattacks on smartphones with its Samsung Knox cybersecurity solution, providing end-to-end protection for users' devices.
Trend Micro bolsters security offering with complete device and identity protection
The solution brings together identity theft and dark web monitoring, WiFi protection, password manager and parental controls.
Apple jumps on the Bluetooth tracker bandwagon pioneered by Tile
Apple has entered the market for Bluetooth trackers, pioneered by companies like Tile - but as always, Apple puts its own spin on things.
E-waste becoming a massive issue for businesses, so what can be done?
COVID-19 has led to a surge in e-waste and data security concerns as employees use more devices, according to a study by Blancco Technology Group. .
Nokia phones lead trust rankings finds Counterpoint research
Nokia phones are leading the Android ecosystem in providing the fastest software and security updates across the entire portfolio.
Come 2020, 70% of people will be using smartphones
By 2020, smartphone subscriptions will be more than double, reaching 6.1 billion, and 70% of the world’s population will be using smartphones.
The mobile enemy
Internal data theft can be minimised with a good strategy, if you do it right.
End to end protection
Check Point expert explains why you need endpoint security protection and policies.
Producing a network security policy
Planning a policy is the first step towards good security. Here's how you do it.