TechDay Australia - Australia's technology news network

Secure by Design stories

Story image
OpenText partners with Secure Code Warrior to boost security
This month
#
devops
#
application security
#
devsecops
OpenText has partnered with Secure Code Warrior to enhance security in software development by integrating real-time training into its Fortify product suite.
Story image
Logiq wins contract with MoD for Secure by Design work
Last month
#
digital transformation
#
advanced persistent threat protection
#
risk & compliance
Bristol's Logiq secures a key MoD contract, partnering with Deloitte for another year on the Secure by Design initiative to bolster national cyber security.
Story image
Memory safety vulnerabilities continue to plague ICS: Here’s what to do about it
Thu, 24th Oct 2024
#
cybersecurity
#
nsa
#
industrial control systems
Memory safety vulnerabilities are surging in industrial control systems, with over 3,000 reported in 2022, prompting urgent calls for enhanced security measures.
Story image
Pillar Security reveals critical GenAI vulnerability risks
Fri, 11th Oct 2024
#
phishing
#
advanced persistent threat protection
#
email security
Pillar Security's latest report reveals alarming vulnerabilities in GenAI applications, with attackers achieving a 90% success rate in data leaks.
Story image
SolarWinds launches AI engine to transform IT operations
Wed, 22nd May 2024
#
devops
#
pam
#
mfa
SolarWinds unveils a generative AI engine, SolarWinds AI, set to enhance IT operations by prioritising privacy, security, and reliability, starting with its Service Desk.
Story image
Telefónica Tech UK&I unveils NextDefense for future-proofed cybersecurity
Thu, 14th Mar 2024
#
devops
#
siem
#
advanced persistent threat protection
Telefónica Tech UK&I unveils NextDefense, a cybersecurity service brand aimed at aiding customers towards a secure digital future, leveraging its global Security Operations Centres network.
Story image
New Relic releases interactive security testing with proof-of-exploit reports
Thu, 14th Mar 2024
#
application security
#
devsecops
#
apm
New Relic's observability platform now offers Interactive Application Security Testing (IAST) with a proof-of-exploit reporting feature, enabling real-time identification and fixing of application vulnerabilities before code deployment.
Story image
Checkmarx & Security Compass unite for enhanced threat modelling
Wed, 13th Mar 2024
#
application security
#
software development
#
development
Checkmarx and Security Compass have partnered to increase threat modelling across software development lifecycles, integrating SD Elements to streamline Checkmarx's enterprise application security platform.
Story image
Simplifying the security challenge of operating in multi-cloud
Thu, 8th Feb 2024
#
private cloud
#
data analytics
#
encryption
Overcoming the challenging complexity of multi-cloud operations requires an innovative approach to security focusing on cloud, clusters, containers, customer data and code, commonly referred to as the '5 C’s'.
Story image
ProvenRun & Renault division Ampere boost car cybersecurity
Wed, 7th Feb 2024
#
cartech
#
cybersecurity
#
car
ProvenRun partners with Renault's Ampere on cybersecurity for Software Defined Vehicle (SDV) Platforms, spearheading a new era in secure automotive communication.
Story image
SolarWinds shines with industry recognition for IT solutions
Thu, 18th Jan 2024
#
cloud security
#
apm
#
software development
IT software giant SolarWinds lavished with industry-wide accolades, highlighting the firm's commitment to provide unique solutions for increasingly complex digital landscapes.
Story image
Why 2024 is set to be a pivotal year in cybersecurity
Mon, 11th Dec 2023
#
edutech
#
ransomware
#
partner programmes
With 2024 fast approaching, it’s becoming increasingly evident that next year will be a pivotal one in cybersecurity.
Story image
Navigating the shadow side of AI: Assessing the risks & rewards
Fri, 1st Dec 2023
#
data privacy
#
ai
#
cso / ciso
Harmonic Security examines the risks of 'Shadow AI', highlighting concerns about data leaks and potential threats in growing AI sector.
Story image
Alcatel-Lucent expands Rainbow Hub distribution amid remote work surge
Fri, 27th Oct 2023
#
partner programmes
#
apm
#
software development
Alcatel-Lucent broadens the distribution of its cutting-edge Rainbow Hub platform to cater to increased remote working.
Story image
Certis Australia partners with G:link to improve experiences
Thu, 19th Oct 2023
#
partner programmes
#
transport
#
public transport
Integrated security provider, Certis Australia, has announced a new strategic partnership with the Gold Coast Light Rail, also known as G:link.
Story image
SolarWinds highlights 'Secure By Design' advancements awareness month
Tue, 10th Oct 2023
#
advanced persistent threat protection
#
cybersecurity
#
software development
SolarWinds marks Cybersecurity Awareness Month, highlighting the progress of 'Secure By Design' against cyber threats.
Story image
Logiq Consulting explains UK MOD's 'Secure by Design' Initiative
Sat, 7th Oct 2023
#
advanced persistent threat protection
#
supply chain & logistics
#
risk & compliance
Ministry of Defence's new initiative, Secure by Design, aims to fundamentally change how cyber security is executed across Government departments.
Story image
SolarWinds unveils enhancements to channel partner program
Tue, 5th Sep 2023
#
digital transformation
#
partner programmes
#
cybersecurity
SolarWinds updates transform partner program, announces new tier qualifications and improved benefits to accelerate growth and drive revenue for partners.
Story image
New survey shows digital transformation main challenge for CIOs
Thu, 31st Aug 2023
#
digital transformation
#
fintech
#
financial systems
The need to balance the momentum of innovation with risk awareness and resilience is more important than ever for CIOs in organisations.
Story image
Changing the way the MOD manages cyber resilience for the better
Tue, 11th Jul 2023
#
data protection
#
advanced persistent threat protection
#
risk & compliance
With the increasing cyber threats that exist, our cyber security processes must be able to adapt accordingly, ensuring we are always ahead of our adversaries.