The PRWIRE Press Releases http:// 2017-03-23T03:10:42Z Ivanti DesktopNow Plus Joins Citrix Ready Secure Remote Access Program 2017-03-23T03:10:42Z ivanti-desktopnow-plus-joins-citrix-ready-secure-remote-access-program Sydney – March 23, 2017 – Ivanti, a leader in integrating and automating critical IT tasks, today announced that Ivanti DesktopNow Plus, powered by AppSense, has joined the Citrix Ready Secure Remote Access  program. The Citrix Ready Secure Remote Access program helps customers identify third-party solutions that are recommended to help secure corporate networks from data theft and other security attacks.    Ivanti DesktopNow Plus has been verified to integrate seamlessly with Citrix products in delivering fully personalised, dynamic desktops for all end users and has demonstrated the ability to support the security pillars of the Secure Remote Access program including: application security and data security. DesktopNow Plus secures virtual desktop infrastructures while simultaneously improving user acceptance of XenApp and XenDesktop environments, removing risks to both enterprise security and worker productivity when implementing a desktop virtualisation project.    “At Ivanti, we’re focused on helping customers and their users assure privacy, protect sensitive information and enable compliance of applications and data without compromising workforce flexibility or productivity,” said Jon Rolls, Vice President of Product Management, Ivanti. “It’s an honor to be recognised for these achievements by the Citrix Ready Secure Remote Access program.”    “When integrated with XenApp and XenDesktop, the Ivanti DesktopNow Plus workspace management solution can enhance control at the application level to help protect sensitive business information and defend against zero-day and denial-of-service attacks,” said Siddharth Rabindran, Director, Citrix Ready program at Citrix. “We are pleased to add it to a select list of products that have been verified in the App Security and Data Security categories of our Citrix Ready Secure Remote Access Program.”   As previously announced DesktopNow Plus has been verified as Citrix Ready (https://citrixready.citrix.com/ivanti/ivanti-desktopnow-plus.html®) after completing a rigorous process to ensure compatibility with Citrix NetScaler, Citrix XenDesktop, and Citrix XenApp providing confidence in joint solution compatibility. Customers can be assured that DesktopNow Plus has successfully passed a series of tests established by Citrix, and can be trusted to work effectively with Citrix products in production environments.   Ivanti DesktopNow Plus is a workspace management solution that simplifies desktop deployments and administration, increasing productivity to reduce IT costs and secure endpoints. With DesktopNow Plus, IT organisations can deliver a personalised, compliant desktop regardless of user location or device. The solution also eases Windows 10 migrations and enables secure file sync, sharing and data access.   For more information on how DesktopNow Plus enhances the security of remote access to Citrix XenDesktop and Citrix XenApp, read this jointly developed whitepaper (http://citrixreadyprogram.com/2017/cr_sra/) and infographic (https://citrixready.citrix.com/content/dam/ready/partners/iv/ivanti/appsense131.pdf). You can also watch the Citrix Ready On-Demand Webinar, “A Glimpse into the World of an AppSense and Citrix Architect” here: http://citrixreadyprogram.com/partners/webinar/2017/cr-webinar-appsense   For more information on the Citrix Ready Secure Remote Access program, visit: http://citrixreadyprogram.com/2017/cr_sra   About Ivanti Ivanti is IT evolved. By integrating and automating critical IT tasks, Ivanti helps IT organisations secure the digital workplace. For more than three decades, Ivanti has helped IT professionals address security threats, manage devices and optimise their user experience. From traditional PCs, to mobile devices, virtual machines and the data centre, Ivanti helps discover and manage your IT assets wherever they are located, improving IT service delivery and reducing risk. Ivanti also ensures that supply chain and warehouse teams are effectively leveraging the most up-to-date technology to improve productivity throughout their operation. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit www.ivanti.com  Copyright © 2017, Ivanti.  All rights reserved.   ENDS CyberArk Expands C3 Alliance to Drive Greater Cyber Security Innovation and Collaboration 2017-03-23T01:23:53Z cyberark-expands-c3-alliance-to-drive-greater-cyber-security-innovation-and-collaboration CyberArk (NASDAQ: CYBR), the company that protects organisations from cyber attacks that have made their way inside the network perimeter, today announced the expansion of the C3 Alliance, CyberArk’s global technology partner program.  Extending the power of privileged account security through new partners and technology integrations, customers can better protect against advanced threats through a deeper set of innovative cyber security solutions.     New C3 Alliance partners and integrations include Atos, Datablink, DB Networks, DBmaestro, EZMCOM, Flexera Software, Gemalto, Hexadite, Illusive Networks, Omada, OneLogin, Palo Alto Networks, Phantom, Proofpoint, Qualys, Radiant Logic, RSA, STEALTHbits Technologies, SyferLock, Thales, Utimaco, Vistara and Yubico.   Launched in April 2016, the C3 Alliance was established to bring enterprise software, IT security and services providers together in order to deliver proactive protection, detection and response to customers by putting privileged account security at the core of their cyber security strategies. The program now has 45 partners and features 63 product integrations to increase the value of existing IT investments and improve security across enterprise priorities associated with cloud identity security, application security and endpoint.    “Because there is no silver bullet in security, CISOs are increasingly focusing on the value of an integrated security stack. The C3 Alliance helps drive value across existing IT investments through strategic integrations that take advantage of automation and the ability to streamline processes and data sharing,” said Adam Bosnian, executive vice president, global business development, CyberArk. “The escalation of damaging cyber attacks requires new levels of vendor collaboration. This is why the C3 Alliance continues to expand and prioritise vendor integration and alignment around privileged account security and data for more effective cyber security.”  Unmanaged Service Accounts, Application Security and the Attacker Opportunity Organisations need to be better able to adapt to emerging cyber threats with proactive and responsive controls, especially those aimed at protecting privileged credential vulnerabilities that exist across applications and the IT security stack.    Extensive service account usage by commercial off-the-shelf and internally-developed applications, including identity and access management, DevOps, IT management, asset discovery and vulnerability scanning applications, creates a significant attack surface of unmanaged privileged credentials. Yet, awareness of this application security risk is disproportionately low, even though it may pose one the largest enterprise cyber security vulnerabilities.    Many of the newest C3 Alliance members and integrations focus on addressing the challenge of managing service accounts and privileged application credentials to better protect enterprise-class and SaaS applications that are critical to regular business operations and incident response.    “The interoperability between RSA® Identity Governance and Lifecycle and the CyberArk solution began as a centralised management approach for governing, managing and provisioning all user identities, including privileged identities and access entitlements,” said Jim Ducharme, vice president of Identity Products, RSA. “Today, we are expanding the interoperability with CyberArk to secure the privileged credentials used by RSA Identity Governance and Lifecycle to securely access target systems, such as servers and databases, to collect data and report for compliance and risk management across the enterprise and the cloud to deliver on the benefits of business-driven security.”   “Qualys’ integration with the CyberArk Privileged Account Security Solution helps customers using the Qualys Cloud Platform to simplify password management for authenticated scans across dynamic environments at large scale,” said Sumedh Thakar, chief product officer, Qualys, Inc. “By securely and centrally managing credentials for hybrid environments with a mix of cloud, on-premises and virtualized assets, organisations can automate scanning, increase accuracy and reduce compliance costs.”    “The Phantom security automation and orchestration platform connects in-house and third-party systems to help security operations gain better insight into potential threats across the IT environment, then reduce the time necessary to detect and respond,” Robert Truesdell, director of product management, Phantom. “Phantom apps require privileged credentials to access these systems and that powerful access must be managed and controlled in a consistent, scalable way. That's where our integration with CyberArk becomes so valuable. As our platform continues to expand, we have to be able to centralize the management and security of these privileged application accounts to reduce the attack surface and keep credentials synchronized.”   C3 Alliance Drives Channel Opportunities C3 Alliance members typically integrate with the CyberArk Privileged Account Security Solution.  These integrations have expanded opportunities for reseller and system integration partners that can help customers further maximise existing IT investments by driving additional value and insight.    “Managing service accounts across multiple technologies continues to be a challenge that our clients face,” said Serafino Napoleone, director, Cyber Risk Services at Deloitte. “With expanding C3 Alliance integration capabilities, our clients are now able to automate and strengthen the Identity and Access Management controls on their existing technologies and platforms, while simultaneously benefitting from increased privileged account security and reduced vulnerability to cyber attacks.”  “Integrating privileged account security capabilities from CyberArk with other key technologies, such as identity and access governance, allows us to differentiate our business through high-value security services,” said Arun Kothanath, chief security strategist, DIT/Clango, Inc. “We view the C3 Alliance as a tremendous opportunity to deliver an expanding set of innovative solutions to our customers. These solutions help them prioritise privilege as part of their cyber security strategies, such as the ability to centrally manage all identities to mitigate risks and support compliance.”  Additional Resources View a collection of C3 Alliance member videos: www.cyberark.com/c3-alliance-videos <http://www.cyberark.com/c3-alliance-videos>  For more information about the C3 Alliance, visit: http://www.cyberark.com/partners/technology-partners/ For companies interested in joining the C3 Alliance, visit: http://www.cyberark.com/contact/ eBook: An Attack Pathway Into Your Organization? There’s an App for That: https://www.cyberark.com/resource/attack-pathway-organization-theres-app/>   About CyberArk                                                                                                       CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including more than 45 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the CyberArk blog: http://www.cyberark.com/blog/, or follow on Twitter via: @CyberArk, LinkedIn: https://www.linkedin.com/company/cyber-ark-software, or Facebook: https://www.facebook.com/CyberArk. # # #Copyright © 2017 CyberArk Software. All Rights Reserved.  All other brand names, product names, or trademarks belong to their respective holders.  Datto hires Ryan Weeks as Chief Information Security Officer 2017-03-22T23:30:00Z datto-hires-ryan-weeks-as-chief-information-security-officer Sydney, Australia – March 23, 2017 – Datto, a leading provider of total data protection solutions for businesses around the world, today announced the hiring of Ryan Weeks as Chief Information Security Officer. Weeks will drive the company’s information security initiatives to ensure that the company’s products continuously meet the demanding challenges of Datto’s Managed Service Providers (MSPs) and their customers. He will also be responsible for continuing to develop and maintain the company’s security program roadmap and extending partnerships with MSPs. Weeks will report to Robert Gibbons, Chief Technology Officer.   “Datto strives to exceed the expectations that we jointly set with all of our MSPs, and our data protection technologies are unparalleled in safeguarding essential business data from evolving cyber-threats,” stated Gibbons. “Ryan brings a comprehensive skillset and proven success record that will play a critical role in helping Datto ensure the security of its core products, to deliver the highest standards for our partners.”   According to a recent study commissioned by Babson College, nearly 80 percent of small companies recognise the importance of technology as a means for growing their business and more than 40 percent feel ill-prepared, or have fallen victim to, cyber-attacks.1   “Datto is laser-focused on helping MSPs serve the business continuity, disaster recovery and networking needs of their small-to-medium business customers,” stated Weeks. “I’m eager to build upon Datto’s vision to ensure our solutions provide the level of protection our MSP partners demand and to minimise IT risks for their customers through a pre-emptive, proactive approach.”    Prior to joining Datto, Weeks served as Vice President and Associate Director at FactSet Research Systems, a provider of financial data and analytic applications for investment management and investment banking professionals. Weeks served in a blended management and technical capacity in the security infrastructure and assurance department. He successfully managed the company’s information security program, designed to protect data provided by the world’s largest financial institutions. Weeks also served as a security consultant at Ajilon Consulting. A graduate of Northeastern University, Weeks earned a Master’s degree in information assurance.  About Datto Datto protects business data and provides secure connectivity for tens of thousands of the world's fastest growing companies. Datto's Total Data Protection solutions deliver uninterrupted access to business data on site, in transit and in the cloud. Thousands of IT service providers globally rely on Datto's combination of pioneering technology and dedicated services to ensure businesses are always on, no matter what. Datto is headquartered in Norwalk, Connecticut and has offices in Rochester, Boston, Portland, Toronto, London, Singapore and Sydney.  Media Contacts Amanda Conroy/Amy Rathbone Espresso Communicationsdatto@espressocomms.com.au +61 2 8016 2200   1 State of Small Business in America 2016 MEDIA RELEASE: Moneytree Completes a JPY 1 Billion Funding Series B Funding Round 2017-03-21T20:30:00Z media-release-moneytree-completes-a-jpy-1-billion-funding-series-b-funding-round-2 MEDIA RELEASE 22 March 2017 Moneytree Completes a JPY 1 Billion Funding Series B Funding Round: SBI Investment and major regional banks join mega bank-affiliated venture  capital firms and a leading UK asset management company as investors Moneytree KK (Shibuya, Tokyo) has completed a Series B funding round that will drive its further expansion in the rapidly developing global fintech industry, including entering the Australian market within the coming months. The development paves the way for unprecedented connectivity across the financial services sector with Moneytree providing tools and services that enable individuals and businesses to aggregate and control all their financial data in a single place.  Moneytree will use the funding to add functionality to its popular personal finance management app, as well as to invest in deepening the capabilities of its Moneytree LINK platform (https://link.moneytree.jp) that connects financial institutions and customers through a permission-based data-sharing platform.  Moneytree CEO Paul Chapman said: “We are accelerating Moneytree’s growth to deliver seamless access to Japan’s financial services. In coming months, we will expand beyond the Japanese market and become a regional player, working for positive change, and cementing a position as the most trusted financial data portability platform.” Funds were raised from SBI Investment Co., Ltd., Fukuoka Technology Partners Co., Ltd., Hiroshima Venture Capital Co., Ltd., Senshu Ikeda Capital Company Ltd., and noted British asset management company Baillie Gifford & Co., as well as reinvestment from Series A round investors Mizuho Capital Co., Ltd., SMBC Venture Capital Co., Ltd., and salesforce.com, inc. The total amount raised exceeds JPY 1 billion. SBI Investment Co., Ltd. led the round.  The participation of British asset management company Baillie Gifford & Co. signals a significant step forward in Moneytree’s plans for overseas expansion.  Moneytree LINK has secured over twenty customer and partner companies since 2015. Japanese ‘mega banks’ Mizuho Bank Ltd and Sumitomo Mitsui Banking Corporation have adopted Moneytree LINK, with leading regional bank Senshu Ikeda also on the platform.  Moneytree LINK powers solutions from ten accounting software providers, making it the number one platform in the Japanese accounting industry. Moneytree will increase headcount across the organisation, including Development, Platform, Sales, Marketing and back office.  Mr. Chapman added: “As the fintech market expands rapidly, Moneytree remains focused on our core values of security, privacy, and transparency. As a platform, we will continue to maintain neutrality with regards to partner type, vertical, and even size.” -ends- About Moneytree Moneytree KK was founded in 2012 in Japan with the mission of bringing consumers, small businesses, and banks closer together. The Moneytree mobile app, introduced in 2013, allows users to automatically manage their bank accounts, credit cards, electronic money, mileage, points, and securities all together in one place on mobile and desktop. The app was awarded Apple’s App Store “Best of” in 2013 and 2014.  In 2015, Moneytree launched Moneytree LINK, a service that connects financial institutions and customers through a permission-based data sharing platform. It is aimed at creating value in the fields of accounting, finance, real estate rent management, automobile maintenance, expense settlements, invoice issuance, and asset management.  That same year, Moneytree received an unprecedented round of simultaneous investment by the venture capital arms of all three Japanese mega banks. Moneytree was also chosen by IBM as its first official Fintech API partner, and selected for MasterCard’s Start Path accelerator program.  Please address media inquiries to: AUSTRALIA Eric Robledo Honner TEL: +61 02 8248 3739 E-mail: eric@honner.com.au     JAPAN Kaori Kitakata Moneytree KK Communications Officer TEL: +81 03-4588-0621  E-mail: press@moneytree.jp URL: https://moneytree.jp MEDIA RELEASE 22 March 2017 Moneytree Completes a JPY 1 Billion Funding Series B Funding Round: SBI Investment and major regional banks join mega bank-affiliated venture  capital firms and a leading UK asset management company as investors Moneytree KK (Shibuya, Tokyo) has completed a Series B funding round that will drive its further expansion in the rapidly developing global fintech industry, including entering the Australian market within the coming months. The development paves the way for unprecedented connectivity across the financial services sector with Moneytree providing tools and services that enable individuals and businesses to aggregate and control all their financial data in a single place.  Moneytree will use the funding to add functionality to its popular personal finance management app, as well as to invest in deepening the capabilities of its Moneytree LINK platform (https://link.moneytree.jp) that connects financial institutions and customers through a permission-based data-sharing platform.  Moneytree CEO Paul Chapman said: “We are accelerating Moneytree’s growth to deliver seamless access to Japan’s financial services. In coming months, we will expand beyond the Japanese market and become a regional player, working for positive change, and cementing a position as the most trusted financial data portability platform.” Funds were raised from SBI Investment Co., Ltd., Fukuoka Technology Partners Co., Ltd., Hiroshima Venture Capital Co., Ltd., Senshu Ikeda Capital Company Ltd., and noted British asset management company Baillie Gifford & Co., as well as reinvestment from Series A round investors Mizuho Capital Co., Ltd., SMBC Venture Capital Co., Ltd., and salesforce.com, inc. The total amount raised exceeds JPY 1 billion. SBI Investment Co., Ltd. led the round.  The participation of British asset management company Baillie Gifford & Co. signals a significant step forward in Moneytree’s plans for overseas expansion.  Moneytree LINK has secured over twenty customer and partner companies since 2015. Japanese ‘mega banks’ Mizuho Bank Ltd and Sumitomo Mitsui Banking Corporation have adopted Moneytree LINK, with leading regional bank Senshu Ikeda also on the platform.  Moneytree LINK powers solutions from ten accounting software providers, making it the number one platform in the Japanese accounting industry. Moneytree will increase headcount across the organisation, including Development, Platform, Sales, Marketing and back office.  Mr. Chapman added: “As the fintech market expands rapidly, Moneytree remains focused on our core values of security, privacy, and transparency. As a platform, we will continue to maintain neutrality with regards to partner type, vertical, and even size.” -ends- About Moneytree Moneytree KK was founded in 2012 in Japan with the mission of bringing consumers, small businesses, and banks closer together. The Moneytree mobile app, introduced in 2013, allows users to automatically manage their bank accounts, credit cards, electronic money, mileage, points, and securities all together in one place on mobile and desktop. The app was awarded Apple’s App Store “Best of” in 2013 and 2014.  In 2015, Moneytree launched Moneytree LINK, a service that connects financial institutions and customers through a permission-based data sharing platform. It is aimed at creating value in the fields of accounting, finance, real estate rent management, automobile maintenance, expense settlements, invoice issuance, and asset management.  That same year, Moneytree received an unprecedented round of simultaneous investment by the venture capital arms of all three Japanese mega banks. Moneytree was also chosen by IBM as its first official Fintech API partner, and selected for MasterCard’s Start Path accelerator program.  Please address media inquiries to: AUSTRALIA Eric Robledo Honner TEL: +61 02 8248 3739 E-mail: eric@honner.com.au     JAPAN Kaori Kitakata Moneytree KK Communications Officer TEL: +81 03-4588-0621  E-mail: press@moneytree.jp URL: https://moneytree.jp   NSFOCUS launches in Australia, ideally placed to halt cyber attack tsunami from China 2017-03-17T22:18:14Z nsfocus-launches-in-australia-ideally-placed-to-halt-cyber-attack-tsunami-from-china SYDNEY, March 17, 2017 – NSFOCUS, a global provider of intelligent hybrid DDoS defences, today announced its launch into Australia. The company believes it is uniquely placed to defend against cyber-attacks from China.   Recent reports have indicated that up to 40 percent of global cyber-attacks are associated with China and the exploits discovered in this region can take days, weeks, or even months before they are replicated elsewhere.   “NSFOCUS Global Threat Intelligence is ideally placed to help Australian organisations improve their awareness and enterprise security posture – delivering both strategic and tactical intelligence, and providing organisations with a complete view of the global threat landscape, including China,” said Attley Ng, Senior Vice President Asia Pacific, NSFOCUS.   NSFOCUS is the only company that can provide insight from inside China as well elsewhere around the world, making it uniquely qualified to help mitigate these risks before they escalate. With more than 4,000 active customers, 12,000 network sensors, extensive honeypot networks, over 700G of data collected daily, and visibility into 400 million endpoints, NSFOCUS’ suite of Threat Intelligence solutions help organisations to get ahead of future attacks by implementing countermeasures quickly to protect critical assets.   “The launch of NSFOCUS into Australia is a natural extension of our progress across Asia Pacific,” said Mr. Ng. “Australia has a mature information technology market, with a rich depth of IT expertise that includes cyber security professionals, yet corporates and governments are still falling prey to cyber-attacks.”   He added: “In the aftermath of the massive cyber-attacks the world witnessed last year, organisations in Australia and worldwide can no longer rely solely on threat intelligence feeds to alert them to risks.   “Despite rapid innovation to combat growing threats, security professionals with limited intelligence resources still struggle to keep up with the overwhelming amount of data points these systems aggregate. Implementing a holistic, intelligence-driven solution with true global insight can help security teams to understand strategic and tactical intelligence – not just feed data - to take immediate action on the threats to their business. Our worldwide team of researchers and engineers work around the clock to help customers gain visibility and threat context to effectively respond to threats, both known and unknown.”   The NSFOCUS Threat Intel feed integrates seamlessly with the company’s Cloud and On-Premises DDoS defences, giving organisations such as government, big enterprises and service providers in Australia an additional layer of secured protections.   NSFOCUS has appointed Aquion as its Authorised Value Distributor, to provide localised support to the Australian market and help in recruitment and enabling security channel partners. Already NSFOCUS has committed to sponsoring two major security events this year: the AISA security conference and AusCert 2017.   Stephen Balicki, Managing Director, Aquion said: “Our partnership with NSFOCUS presents us with exceptional opportunities, as their comprehensive solutions deliver a real edge in the data security arena. These will appeal to channel partners and reinforce our AqSEC business unit which helps customers to monitor, manage and secure all elements of enterprise infrastructure using the best technologies.”   “As an endorsement of our capabilities, NSFOCUS is the leading choice when it comes to data security options,” said James Braunegg, Managing Director of Melbourne-based Micron21. “Our Tier IV data centre is the first in Australia to achieve Uptime Institute Tier IV Fault Tolerant Design Certification. This establishes Micron 21 as the most secure, reliable and high calibre commercial information technology facility in Australia.   “In addition to our Tier IV compliance, Micron 21 is ISO 27001 certified. To achieve these stellar standards, we researched the best data security options, and selected NSFOCUS. Now we are confident that reliability, security and premium technology set the standard for our services.”   The NSFOCUS suite of Threat Intelligence solutions includes:   NSFOCUS Threat Intelligence (NTI) Portal: Allows users to gain additional insight into various threats and threat actors via research, data collection, and analysis of crowdsourced information. NSFOCUS customers can drill deeper into detail on threats, upload malware samples for analysis, and monitor/track IP addresses with automatic notifications – providing a tailored experience for the most relevant threats. Threat Analysis Alerts and Reports: NSFOCUS provides timely analysis on threat trends, campaigns and actors, in addition to critical vulnerabilities identified. Via weekly blogs, emergency alerts and regularly released reports, customers are updated on the latest threat information available. Actionable Data Feeds: Delivered by strategically located NSFOCUS Cloud Centers, these feeds provide information across four crucial risk areas: IP Reputation: A list of IP addresses that have earned a negative reputation through involvement in suspicious activity, including phishing, botnets, APTs, DDoS attacks and more. Malicious Web/URL: A domain reputation list that includes malicious websites that are the source of exploit kits, malware and phishing attacks. Command & Control:  A set of IP addresses that are known to control botnet armies used to take services offline. This feed is used to prevent organizations’ own resources from unknowingly participating in cyber-attacks, mitigate ransomware, as well as conserving network resources. Malware Hashes: A set of MD5 file hashes that can be used to identify malware in email or file transfers, as well as stored data – protecting against malware, ransomware, Trojans, scanning, probing, and data leakage. NSFOCUS can easily augment existing threat intelligence through integration with other threat intelligence offerings or SIEM deployments, and across NSFOCUS’ network and application security products.   To learn more about NSFOCUS’ approach to threat intelligence, visit http://nsfocusglobal.com/threat-intelligence/  Contact Christine Tee Sr. Director, Channels and Marketing, NSFOCUS (65) 9679 1481 ctee@nsfocusglobal.com  About NSFOCUS IB   NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an award-winning enterprise application and network security provider, with operations in the Americas, Europe, the Middle East and Asia Pacific. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company's Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, dynamic protection from advanced cyber threats.   NSFOCUS has fifteen years of success and experience working with Fortune 500 companies, including four of the world’s five largest financial institutions, as well as organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS IB has technology and channel partners in more than 60 countries, and is a winner of the Microsoft Bug Bounty Program for 4 consecutive years, a member of the Microsoft Active Protections Program (MAPP), StopBadware.org, and the Cloud Security Alliance (CSA).   Enterprise- and carrier-grade products undergo rigorous evaluation and testing to Veracode VL4 and ISO 27001 certification, delivering powerful and effective threat management combined with advanced data analytics and intrusion prevention and detection capabilities.   A research arm, the NSFOCUS Security Labs, is a renowned technical research center that tracks and analyzes global intelligence while identifying new network vulnerabilities and security trends.   Visit NSFOCUS: www.nsfocusglobal.com Read the blog: http://nsfocusglobal.com/category/blog/ Follow on Twitter: https://twitter.com/NSFOCUS_Intl Follow on LinkedIn: https://www.linkedin.com/company/nsfocus Follow on Facebook: https://www.facebook.com/nsfocus/   NSFOCUS; NSFOCUS, INC. and NSFOCUS Anti-DDoS System (ADS) are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.         Dell Boomi Acquires ManyWho 2017-03-17T00:29:32Z dell-boomi-acquires-manywho ROUND ROCK, Texas, Mar. 16, 2017 – Dell Boomi™ (Boomi) announced it has completed a transaction to acquire ManyWho™, a unified cloud and low-code development platform. ManyWho simplifies workflow automation and allows businesses and developers to turn business processes into rich software applications to connect employees, customers and core systems. Workflow automation is a critical need for modern businesses and organizations pursuing digital transformation and IT modernization. Adding the ManyWho low-code capabilities to Boomi’s market-leading integration platform accelerates the company’s ability to deliver workflow automation to customers on a unified platform, something no other company can match. The acquisition unlocks the ability for businesses to maximize best-of-breed cloud applications, driving efficiency, increasing time to value and building a competitive advantage. With the addition of ManyWho, the Boomi platform provides customers with the enabling technology to address the challenges of Hybrid IT. Now, the platform allows businesses to connect, manage data changes, ensure data quality and re-establish efficient business processes across your IT landscape. Boomi is the world’s leading cloud integration platform. ManyWho is rethinking the way businesses manage workflow automation. Together, the Boomi platform offers the only solution where customers can move, manage, govern and automate data and processes in a unified way. “Both Boomi and ManyWho were born in the cloud and are cloud native. Without an on-premises legacy to manage, Boomi provides instant access to services with no installation, effortless and automatic software upgrades and crowd-sourced ease-of-use to achieve short time-to-value,” said Chris McNabb, CEO of Boomi. “Boomi plus ManyWho brings world class integration together with leading cloud workflow automation. This combination provides our customers with a connected workflow which is key to an efficient and differentiated business.” “Boomi is a perfect fit for ManyWho. Both companies are committed to delivering innovative ways to help companies move fast, be nimble and collaborate at scale,” said Steve Wood, co-founder of ManyWho. “Joining Boomi allows ManyWho to scale quickly, offering businesses the end-to-end integration solution they need to drive Digital Transformation.’’ ManyWho was founded in 2013 and is headquartered in San Francisco, California. Boomi plans to keep ManyWho’s employees and existing operations, and will continue to invest in additional engineering, channel, marketing, professional services, support and sales capability to grow this business. To learn more about how these new Boomi workflow features can help your business or see a demonstration, please visit: www.boomi.com/workflow. About ManyWho ManyWho is an agile, enterprise-level, cloud-based, application development platform. Agility doesn’t have to mean compromise however – ManyWho builds social, mobile (including offline) and real-time applications that can run on any desktop or mobile device, operating system or platform. Headquartered in San Francisco and with a presence in Exeter, UK, ManyWho is revolutionizing the world of business process effectiveness by helping corporations get the best out of their existing applications and investments. About Dell Boomi Dell Boomi (Boomi), an independent business unit of Dell, accelerates business agility by integrating the information organizations need whenever and however they need it. The Boomi integration platform dramatically transforms the way organizations connect, create, manage and govern all their applications and data. As a result, more than 5,300 organizations of all sizes use the Boomi platform to run smarter, faster, better. Boomi also helps customers drastically reduce implementation times and offers substantial cost savings over traditional integration, MDM and API management solutions. Visit http://www.boomi.com for more information. © Dell and Dell Boomi are trademarks of Dell Inc. ManyWho is a trademark of Boomi Inc., a Dell subsidiary. Dell disclaims any proprietary interest in the marks and names of others. # # # Micron21 data centre becomes Australia’s first to achieve Uptime Institute Tier IV Fault Tolerant Design Certification 2017-03-14T23:40:07Z micron21-data-centre-becomes-australia-s-first-to-achieve-uptime-institute-tier-iv-fault-tolerant-design-certification MELBOURNE – March 15, 2017 – Micron21 announced today that its data centre has achieved Uptime Institute Tier IV Design Certification. This certification is based on a rigorous set of criteria covering mechanical, electrical, structural and site elements. Micron21 is the first data centre in Australia to be awarded Tier IV Fault Tolerant Design Certification. “We are thrilled to be included among the few data centres in the world to receive the Uptime Institute Tier IV Design Certification,” said Micron21 founder, James Braunegg. “This is a positive first step forward in data centre design for Australia, with rigorous data security standards to help us define a benchmark for excellence.” The Micron21 state-of-the-art data centre is located in an outer eastern suburb of Melbourne. Its design caters for fully managed high density cloud services and support. It is a hub that provides solutions for clients requiring mission critical and fault tolerant data centre services. The data centre also includes an onsite Systems and Security Centre and Network Operation Centre (SOC and NOC). These are key to providing fully integrated monitoring and support services for customers. Many customers require direct access to highly talented systems, security and network engineers 24 hours a day. All of the above create a complete end-to-end solution for customers. James Braunegg said: “Key supporters who helped us on our journey include Blue IoT, Brocade, Cummins Power Generation, Dell, NSFOCUS, Uptime Institute and Vertiv Corporation. We thank them for their valuable support.” Micron21’s certification reflects on the company’s dedication to securing excellence in the realm of data and hosting solutions. These physical structures maintain Micron21’s global DDoS-protected network for ASX listed, Government and private Australian companies. Clients of Micron21 range from major ISPs to Australian hosting providers, and Government departments, through to local small and medium businesses. “We are pleased to award Micron21 the Uptime Institute Tier IV Design Certification,” said John Duffin, Managing Director, South Asia, Uptime Institute. “Achieving a Tier IV Fault Tolerant Design Certification illustrates that the facility meets the highest standards for infrastructure functionality and capacity as demonstrated on the design documents. This ensures that plans are configured to meet uptime goals and provide the critical business infrastructure needed, and is an important first step toward Tier Certification of a Constructed Facility.”  About Micron21 Established in August 2009, Micron21 provides and operates state-of-the-art cloud and data centre services certified to an ISO 27001 standard, within an Uptime Institute Certified Tier IV environment. Micron21 delivers mission critical services by owning and operating its own world class, fully redundant data centre. The data centre provides continuous power, cooling, physical and electronic security and highly redundant data transmission services. The core business products include: Server Co-location, DDoS Protection as-a-Service, virtual and physical dedicated servers, cloud services, domain names, high performance web hosting, disaster recovery (DR) solutions, load balancing, IP transit, fixed wireless network services, point to point fibre services, security services, Backup and Infrastructure as-a-Service, managed services and solution architecture. Its customers include global medium and enterprise-level corporations, government departments, Internet Service Providers, and wholesale resellers.About Uptime Institute Uptime Institute has awarded over 1000 Tier Certifications in over 80 countries and provided Accredited Tier Training for over 3000 professionals worldwide. Uptime Institute is an unbiased advisory organisation focused on improving the performance, efficiency, and reliability of business critical infrastructure through innova- tion, collaboration, and independent certifications. Uptime Institute is recognised globally for the creation and administration of the Tier Standards & Certifications for Data Center Design, Construction, and Operational Sustainability along with its Management & Operations reviews, FORCSS® methodology, and Efficient IT Stamp of Approval.For more information James Brauneggjames.braunegg@micron21.com 03. 9751 7690   How Australia’s ‘Essential Eight’ sets the standard for sensitive data protection and breach notification 2017-03-10T00:11:40Z how-australia-s-essential-eight-sets-the-standard-for-sensitive-data-protection-and-breach-notification By Christopher Strand,  Security Risk and Compliance Officer, Carbon Black   Globally, more and more jurisdictions are releasing mandates that will have a substantial impact on companies regarding breach notification and the protection of sensitive data. One of those cyber security mandates put into action recently happened in Australia. On February 13, the Senate passed the Privacy Amendment (Notifiable Data Breaches) Bill 2016. This mandate will put pressure on Australian businesses to provide information on sensitive data breaches. The new rules require Commonwealth government agencies, private sector organisations, and any businesses that are regulated by the privacy act, to get in line within 12 months. Failure to do so puts businesses at risk of civil penalties, public reputational harm, and other negative financial consequences. The new bill will help to draw attention to cyber security solutions as well as focusing on the practices that protect data and business systems throughout Australia. Companies will need to account for their security systems and take steps to ensure they have the right technologies and plans in place to prove protection. Companies receive help with this task, thanks to The Australian Signals Directorate (ASD), a Department of Defence intelligence agency responsible for signals intelligence (SIGINT) and information security (INFOSEC). The agency produces a security guidance risk-planning baseline called ‘Strategies to mitigate cyber security incidents.’ It’s a prioritised list of practical actions that organisations can put into place to help shore up their information security postures. Aligned with the updated security mandate is the latest version of the mitigation strategies, called the ‘Essential Eight.’ After a business has performed its due diligence to identify which core assets require attention, the type of adversaries it faces, and what level of protection is needed, the business will have a baseline cyber security posture. Ostensibly this baseline will make it much more difficult for an adversary to compromise the system. Additionally, businesses will have a good handle on how to measure the security controls that play an important part of ensuring proper protection. The ‘Essential Eight’ practises fall into the following categories across two distinct functional areas: The first four are focused on stopping malware from running: Application whitelisting – Control which programs can run on your systems, and stop the rest. Patch applications regularly – stop attacks from exploiting known vulnerabilities. Disable untrusted Microsoft Office macros – a common channel for malware. Harden user applications – block Web browser access to Adobe Flash player    (uninstall if possible), Web advertisements, and untrusted Java code on the Internet. The second four limit the extent of incidents and help recover data: Restrict administrative privileges – Limit privileges to only those who need them. Patch operating systems – To avoid known security vulnerabilities that can be exploited or move to threat mitigation by introducing a compensating control to protect unsupported systems. Backup important data daily– and ensure it meets the specifications of data retention policies.    Apply multi-factor authentication – add a second factor beyond a simple password across all systems. On a recent tour of the region, I had the privilege of meeting with one of the lead directors of the ASD, when the ‘Essential Eight’ was in final edit mode. I had the chance to discuss the security controls and was impressed to hear the ASDs’ plans for supporting businesses with the new mandates via the mitigation strategies. The ASD is actively engaging with businesses in the case of an incident and offering support before, during and after the mandatory notification that would be triggered under the breach notification laws. This is a great example of supporting and standing behind the mitigation strategies and is also a good way to promote adoption to ensure businesses are moving toward better security postures. It also ensures businesses are fully transparent in the case of an incident. It was also encouraging to find common ground between the mitigation recommendations put forth by the ASD and the way Carbon Black approaches security posture through our focus on event stream processing, ranking risks throughout the attack cycle, as well as proof of data integrity and policy enforcement. Carbon Black has promoted the idea of implementing a good security mitigation baseline as the first step to moving towards better security protection, and also advocates the necessity for most organisations to have the option to implement these baselines quickly, while collecting valuable intelligence from the get-go. Just as the ASD aims to ensure that its strategies are customisable and accessible for organizations, Carbon Black places importance on providing attack mitigation that businesses can stand up quickly and easily, while deriving effective threat metrics that can help get to the root of solving the threat problem.   After careful review of the new ‘Essential Eight,’ it is apparent the ASD has taken implementation and audit fatigue into account when designing the mitigations.  This is the last item that many baselines and frameworks fail to address. A mitigation strategy is only as strong as the completeness of its implementation. Many other jurisdictions should take a page from the ASD on how to encourage businesses to take the first steps to creating an environment fostering better security. The new strategy ensures that businesses will be able to take advantage of the suggested security parameters quickly and start down the road of better risk and threat mitigation. Carbon Black is looking forward to delving further into the mitigation strategies and working with the ASD to promote better security posture and reduced threat risk at the ACSC event in Canberra on March 14-16.                                    Datto launches new Global Partner Program to accelerate growth for managed service providers 2017-03-09T23:30:00Z datto-launches-new-global-partner-program-to-accelerate-growth-for-managed-service-providers Sydney, Australia – March 10, 2017 – Datto, a leading provider of total data protection solutions for businesses around the world, today announced the launch of its new Global Partner Program. As a channel only organisation, the MSP community is always the top priority for Datto. With more than 6,000 partners across the globe, Datto listened and acted on essential feedback from the MSP ecosystem to create the new program. The Datto Global Partner Program was developed to accelerate partners’ business growth with actionable enablement programs focused on sales and marketing.  Datto’s overarching goal of the program is to further invest in the MSP community with more training, education and resources to empower partners with the tools they need to be successful.     Building on the prior award-winning Datto partner program, the new program includes business planning, commercial and technical education sessions, enhanced training and onboarding best practices, as well as access to Datto’s business continuity, disaster recovery and managed networking solutions. The program structure benchmarks partners by monthly recurring revenue in four new tiers: Business, Professional, Enterprise, and Blue.   Some of the program highlights include: MarketNow: A marketing automation platform designed for non-marketers, with pre-built promotional campaigns, co-branded and customisable collateral, and streamlined social media content to communicate with clients and prospects at the right time with the right message to grow their business. Benchmark Analysis: Partners will have the opportunity to evaluate their businesses against new research and benchmarks from top Datto Partner performers, identifying opportunities for growth and training with their Datto Account Managers. Not for Resale (NFR) Program: Datto’s NFR Program supports and empowers partners to perform live demonstrations for customers with discounted device programs for internal use or demos. Partners are now able to receive one NFR device per product family to experience it all. Advanced Sales Tactics Training: This new course focuses on the benefits and opportunities of going up market and unique sales strategies for mid-market organisations. “Our partnership with Datto is about more than technology solutions. From day one, Datto has enabled Ash Creek to grow our business,” said Joseph Cichowski, Vice President of Marketing for Ash Creek, a Datto partner. “Now, with access to the MarketNow platform, we'll have a marketing automation tool right at our fingertips to empower us to do even more. Ash Creek was consulted in the vendor evaluation process for this exciting new marketing platform, and we appreciate that Datto invests so heavily in its partners' success.”   “This new program allows us to engage with our partners on a much deeper level, empower them with the tangible tools and resources they need to be successful, and motivate them with fresh, new benefits,” said Sue MacGregor, Director of Partner Marketing for Datto. “Our partners have grown at a tremendous pace and it’s a necessity that our enablement programs evolve in lockstep to further support their business growth and success.”   The Datto Global Partner Program encompasses four partner levels: Business, Professional, Enterprise and Blue. To learn more about Datto’s Partner Program and new upgrades, register for the webinar happening today, March 10, 2017.  About Datto: Datto protects business data and provides secure connectivity for tens of thousands of the world's fastest growing companies. Datto's Total Data Protection solutions deliver uninterrupted access to business data on site, in transit and in the cloud. Thousands of IT service providers globally rely on Datto's combination of pioneering technology and dedicated services to ensure businesses are always on, no matter what. Datto is headquartered in Norwalk, Connecticut and has offices in Rochester, Boston, Portland, Toronto, London, Singapore and Sydney. Learn more at www.datto.com.  Media contacts Amanda Conroy/Amy Rathbone Espresso Communicationsdatto@espressocomms.com.au +61 2 8016 2200 CA Technologies positioned a leader for identity governance and administration 2017-03-07T02:12:00Z ca-technologies-positioned-a-leader-for-identity-governance-and-administration Gartner recognises CA Identity Suite for ability to execute and completeness of vision in 2017 Gartner Magic Quadrant SYDNEY – 7 March, 2017 – CA Technologies (NASDAQ:CA) has been positioned by Gartner, Inc., in the Leaders quadrant of the 2017 Gartner Magic Quadrant for Identity Governance and Administration (IGA).* The report evaluated CA Identity Suite, a comprehensive identity management and access governance solution with a simple, intuitive user experience. Vendors were evaluated on their ability to execute and completeness of vision. According to the report, “IGA Leaders deliver a comprehensive toolset for governance and administration of identity and access. These vendors have successfully built a significant installed customer base and revenue stream, and have high viability ratings and robust revenue growth. Leaders also show evidence of superior vision and execution for anticipated requirements related to technology, methodology or means of delivery. Leaders typically demonstrate customer satisfaction with IGA capabilities and/or related service and support.” In a survey of more than 100 CA Identity Suite Users, 70 percent report that using CA Identity Suite has reduced costs more than 25 percent.** The virtual appliance reduces costs even further with installation and configuration time going from days to minutes. Organisations also can avoid high recurring software licensing costs with the appliance providing pre-installed instances of an operating system, application server and directory. “Identity and governance administration isn’t just about compliance; it’s also about protecting the expanded attack surface that we see in today’s hybrid IT environments,” said Lim Teng Sherng, vice president, Security, Asia Pacific & Japan, CA Technologies. “CA Identity Suite is a comprehensive IGA solution that helps our customers secure their enterprises by proactively managing identity and access rights for all their users and applications, whether in the cloud or on-premises.” To receive a complimentary copy of the report, visit "Gartner Magic Quadrant for Identity Governance and Administration." To learn more about CA Technologies’ Identity and Access Management solutions, visit www.ca.com/IAM. * Gartner Magic Quadrant for Identity Governance and Administration, by Felix Gaehtgens, Perry Carpenter, Brian Iverson and Kevin Kampman, February 22, 2017. ** TechValidate survey of 107 users of CA Identity Suite, June 2016. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About CA Technologies CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com. Follow CA Technologies Twitter Social Media Page Press Releases Blogs Legal Notices Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Australian Information Security Association announces call for Extraordinary General Meeting 2017-03-06T23:16:09Z australian-information-security-association-announces-call-for-extraordinary-general-meeting SYDNEY, AUSTRALIA – 6 March 2017 – The Australian Information Security Association (AISA), the country’s peak body for information and cyber security professionals, has announced that it will hold an Extraordinary General Meeting (EGM) for all members on Friday, 24 March 2017.   This decision by AISA’s newly appointed Board follows a petition for an EGM that was received in February. While this petition failed to meet the requisite number of signatures, the Board has elected to hold an EGM to remove ongoing uncertainty and allow AISA to turn its full focus towards the future.   “2017 is shaping up to be a strong year for AISA,” says Damien Manuel, Deputy Chair at AISA. “AISA’s annual National Conference is the foremost event in Australia’s cyber security calendar, and this year it is promising to be another sell-out event. We are excited to have secured an amazing list of global and local speakers, and our open call for papers will be released on 31 March 2017.”   AISA has also announced that its Annual General Meeting (AGM) will be held one month earlier in November 2017 to improve member participation.   Mr Manuel says, “AISA plays a critical role in the development of a robust information security sector through its specific focus on building the capacity of cyber security professionals in Australia. We are supported by nearly 3,000 industry leaders and their engagement is vital to ensure that our decisions heading into 2018 reflect the interests of all AISA members.”   Along with this change in date, members will be provided three months’ notice of the AGM, rather than the standard one month. This will allow time for Board candidates to present at member briefing sessions, which will be held via webcast to enable candidates to connect with other AISA members on a national scale.   The EGM will be held in most states across Australia. Webinar facilities are being sought for those unable to attend in person and proxy voting forms are available for members unable to attend the EGM.   Further information on the upcoming EGM can be found here.   ####  About the Australian Information Security Association The Australian Information Security Association (AISA) is the peak body for information and cyber security professionals. AISA champions the development of a robust information security sector by building the capacity of professionals in Australia and advancing the cyber security and safety of the Australian public as well as businesses and governments in Australia.    Media contacts Corrie McLeod and Gloria Lee Espresso Communications on behalf of the Australian Information Security Association +61 2 8016 2200corrie@espressocomms.com.au; gloria@espressocomms.com.au eVestigator Simon Smith, a Cybersecurity Expert Gives Tips to Protect Yourself from Identity Theft 2017-03-06T04:13:38Z evestigator-simon-smith-a-cybersecurity-expert-gives-tips-to-protect-yourself-from-identity-theft Simon Smith, Private Investigator, a well known Cyber Security expert answers the question if anyone can have their identity taken? eVestigator explains that no matter how smart you are you, you are susceptible to human error and deception known by a process called "social engineering." This concept he describes is a form of human deception in Cyber Security that most readers are likely to be a victim of at some stage in their lives. He makes it clear that one cannot control what one does not know. eVestigator Simon Smith is often asked if he can "hack" into a person's private social media accounts. He describes this is a Hollywood-style perception of hacking but there are some truths. He puts forward two answers, both "Yes" and "No." He states that "a person can control what they have possession of, however are oblivious to what they don’t." In forums, and in criticisms directed towards many victims, he often reads members of the public being very critical about others that may have been scammed on dating sites, or email phishing campaigns. He recognises that sometimes people call them "stupid" and knows the psychology of both the scammer and the victim and is capable of making a fair comment. Mr. Smith knows a secret he can share that only the highest level Forensic Investigators and Cyber Security experts know and he is prepared to share it. He is quick to point out that victims are most definitely not "stupid." He refers to his clients as typically very smart people who have been deceived. Secondly, the secret that he holds would make those who criticise think twice before making such a statement. "The human mind is a complex form of art," he often likes to say. He refers to the term "social engineering" and has in fact been able to manipulate information out of scammers and cyber stalkers using very sophisticated human manipulation and counter intelligence techniques that do not ever involve the use of a computer. He encourages those people who criticise to spend a day with him and they may be of a different view at the end of the day. He is of the strong view that some external research on "social engineering" may show those who criticise victims exactly how everyone is already essentially tricked every day of their lives. Mr. Smith is a recognised expert witness for the courts in Cyber Security, Information Technology Systems, Reverse Engineering and any technical expert dispute. He has extreme industry experience and has caught over 200 stalkers and over $10 million dollars of international scammers, a job which would ordinarily be for the Police and AFP/Interpol, which is prevalent in the Australian media at the moment. Mr. Smith is of the view that today's methods in dealing with Cyber Security are taught incorrectly and now needs to adapt with legislative change. He believes companies everywhere have to drop their current structures and adapt to new regulatory data-breach reporting requirements, or face getting serious fines, penalties or even worse, loss of business. Mr. Smith says, "You cannot do a course to become a Cyber Security Expert and companies need to know that if you do not spend the money in risk mitigation, you will spend one hundred times more in losses." Mr. Smith is a strong follower of the media and contributes to exposing cyber-attacks and the best methods of avoiding them for the everyday citizen. eVestigator Simon Smith identifies below just some key strategies an individual can employ to protect their personal identity on the Internet from what they have within their control: 1. Change your password and security questions regularly and have a different password for all accounts. (It's annoying but necessary.) 2. Always enable two-factor authentication to a physical device. 3. Never enable the default "Family Sharing" - "Locate my Friends" or other default sharing applications placed on iPhones and Androids. 4. Get off iCloud - Use encrypted backups more. 5. Disable Android Device Manager on your phone. 6. Forever keep checking for security alerts by your email provider. 7. Never join a free Wi-Fi hotspot even if it is password protected, and only trust your home if setup correctly. 8. Logout of your email immediately from any browser if using webmail. Google does not care that you stop reading email. Google continues to check out everything else you are up to. 9. Install TOR Browser and surf the internet anonymously. Mr. Smith wrote Orion Hidden IP Browser++ for iOS but generally any TOR browser is worth looking into. 10. Never use passwords that aren't crazily cryptic. 11. Always logout of Facebook or any social network session you log in to. Mr. Simon Smith can be contacted at the contact information below. He is best utilised as a Cyber Forensic Investigator, Counter Intelligence Expert and Court Expert Witness and Dark Web Expert.eVestigator® - Expert Witness, Computer Forensic Private and Government/Cybercrime Investigator, CEO, CTO, CSIO, CEFI, CWTS, PI, FDRP, CFHI, CCIE, CCTA, CSMIE, MCSD, MCP, GDipAMLCTF, GDipStrLdr, GCertITStrMan, GCertITSus, GCertDigEd,GDipMan, GDipPortMan, GDipFDR, AdvDipGov (Fraud/Investigation/Workplace), AdvDipRiskMan, Computer Digital Forensic Investigator and Certified Expert Witness, Cyber-Stalking, Online Harassment Expert, Hi-Tech Crime Investigator, Family Dispute Resolution Practitioner and Nationally Accredited Mediator, Government, Workplace / Private Investigator (Licensed under Victoria Police LRD), Master Programmer - 20+ yrs com-exp, Auditor, Ethical Hacker, Recognised Dept. Homeland Security Certifications below. Member ISSA, VSCL, IASA, MCSD, MCP, CCP, Stanford University Cryptology Certified, SANS Cyber Aces Certified, Certified Forensic Hi-Tech Investigator (CFHI), Certified Cyber Investigative Expert (CCIE), Certified e-Commerce Fraud Investigator (CEFI), Certified Workplace Threat Specialist (CWTS), Certified Social Media Intelligence Expert (CSMIE), Certified Cyber Threat Analyst (CCTA), TW @http://www.twitter.com/_eforensic  LI http://www.linkedin.com/in/simonsmithinvestigator FB http://www.facebook.com/simonsmithinvestigator New Data: High Cyber Security Maturity in IT, Telco, Finance, but Health Care and Energy Lag Behind. 2017-03-02T05:01:00Z new-data-high-cyber-security-maturity-in-it-telco-finance-but-health-care-and-energy-lag-behind Australia’s first cyber security collaboration platform – Security Colony (securitycolony.com) – today released its “Vendor Risk Assessment” tool, enabling any organisation to risk assess their internet facing sites, and receive a profile reflecting their cyber security maturity. To demonstrate the system, scores were calculated for each of the ASX 100 companies. Analysed by industry, the average industry scores – out of 10 – were as follows: Key findings of the analysis were:  - The IT industry has the best average score, showing their understanding of the importance of consistent cyber security processes.  - Telecommunications and Financial Services round out the Top 3.  - Energy, Materials (including mining) and Industrials are less mature, reflecting the reduced focus they have placed on cyber security  historically.  - Health Care is in the bottom 4, a significant concern given the sensitivity of data held. Just 3 companies in the ASX 100 received a ‘perfect 10’ – ANZ Bank, Link Group, and Star Entertainment Group. The VRA tool was developed by Hivint in conjunction with a major financial services client, to ensure that their vendors were not a cause of business disruption, and gain assurance that information entrusted to them is secure. Nick Ellsmore, Co-founder of Security Colony, explained the purpose for building the system: “While it’s important to know your own security posture, it’s equally as important to have a way to see the security posture of the companies you trust with your data.” “The Security Colony VRA tool provides subscribers with a fast, lightweight, and low cost way to keep an ongoing watch on their suppliers’ cyber security posture.” A study identified that 32% of companies do not evaluate third party vendors and this can be attributed to the cause of many global data breaches.  However, the VRA space is a growing market where the demand for vendor security and risk management solutions are increasing. The VRA tool is now live in the Security Colony (securitycolony.com) portal.  Membership is free and any organization can see their own score after signing up.  More detail is in our blog - blog.hivint.com. SAI Global’s suite of risk management software is now even stronger 2017-03-01T02:49:55Z sai-global-s-suite-of-risk-management-software-is-now-even-stronger IT Risk Manager* was awarded a 5-star rating by cybersecurity specialist Peter Robinson of SC Media and was named SC Magazine’s recommended traditional GRC product. It is flexible, scalable, and affordable, enabling Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) to take an intelligent approach to the daily challenges of managing corporate and information security risk. ‘In today’s global marketplace, addressing corporate and information security risks and meeting compliance obligations has become increasingly complex.  IT Risk Manager greatly enhances and augments the existing portfolio of risk management software solutions we provide including our GRC software, Compliance 360 and EHS software, Cintellate’ said Jan Kruger, SAI Global’s Executive Vice President of Risk Solutions. Identified as possibly the most flexible system SC Magazine had observed, IT Risk Manager’s strengths included its functionality, scalability, risk focus, connection to outside data sources such as vulnerability assessment tools, price-point and length of experience. Noting the solution had no observed weaknesses, IT Risk Manager’s ability to be rapidly deployed contributed to it being named a ‘best practice’ IT GRC solution.  SAI Global’s IT Risk Manager was also recognised by independent research organisation Gartner as a Challenger in both the IT Risk Management** and IT Vendor Risk Management Magic Quadrants during 2016. Read the report here.*** Manual IT GRC processes leave the digital business vulnerable to failure, inefficiencies and cyber-attacks. IT Risk Manager is an out-of-the-box, cloud-based GRC solution designed for rapid deployment within an organisation; once deployed it enables information security teams to streamline and manage digital risk and compliance across the enterprise and extended vendor network right away. IT Risk Manager was purchased by SAI Global in August 2016 from Brazilian parent company Modulo Security Solutions. SAI Global assures customers the name change, which formed part of the terms of the sale agreement, will not impact the solution, product inclusions and service previous ‘Modulo IT Risk Manager’ users enjoyed. People interested in finding out more about the benefits of using IT Risk Manager to meet compliance obligations and manage their information security risks are recommended to visit SAI Global’s website which includes details of relevant specialists in their region. Introductory Webinar: To find out more about IT Risk Manager and how it can enhance your information security risk intelligence, join our free webinar hosted by John Ambra, SAI Global’s Vice President of Risk Product Strategy. Find out more here. *SC Magazine's review article refers to IT Risk Manager as Modulo. **Appears as Modulo, acquired by SAI Global in September 2016 ***Gartner, Magic Quadrant for IT Vendor Risk Management, 28 April 2016 Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Carbon Black extends reach with M.Tech partnership 2017-02-27T22:40:20Z carbon-black-extends-reach-with-m-tech-partnership SYDNEY—February 28, 2017.  Carbon Black, the leading provider of next-generation endpoint security, today announced a channel distribution agreement with M.Tech, a leading regional IT security solutions distributor. M.Tech now offers Carbon Black’s next-generation antivirus (NGAV) solution, Cb Defense, to its extensive Australian reseller base. Using a combination of endpoint and cloud-based technologies, Cb Defense delivers a breakthrough security model known as ‘streaming prevention’ to block malware, like ransomware, as well as increasingly common attacks that exploit memory and scripting languages, such as PowerShell. “Key to this partnership is our ability to provide Carbon Black with a steady stream of new opportunities,” said Paul Lim, Regional Director ANZ, M.Tech. “While we have a strong focus on security, our portfolio has lacked an antivirus or next-generation antivirus solution. So we will be presenting Carbon Black’s solutions to the market through our broad partner network across Australia, and across Asia Pacific for any trans-national customers.” He added: “We selected Carbon Black after careful evaluation, which showed that their solutions offer the widest feature set in the endpoint security market, and they respond quickly with new technology that counters the changing cyber-crime scenario. “Our partners want the flexibility to offer next-generation endpoint protection technology to their customers not just as a resell but via methods such as managed Security Services and even professional services such as Incident Response. Carbon Black’s flexible partner model enables our partners to serve customer’s the best technology in the most appropriate method.” “Next-generation endpoint security is taking off across Australia due to the increased sophistication of attacks and proliferation of ransomware,” said Kane Lightowler, Managing Director of Carbon Black for Asia Pacific and Japan. “Being focused purely on information security, M.Tech’s partners are the best of the best in Australian information security. Carbon Black’s next-generation endpoint security solutions make a great addition to their product portfolio.”About M.Tech M.Tech is a leading regional IT security, application delivery network and video communications solutions distributor. Established in May 2002, M.Tech is headquartered in Singapore and has a network of 33 offices in 17 countries to provide on-site sales, marketing as well as technical support to our reseller partners. The company’s vision is to be the preferred, best-of-breed security solutions provider for integrated and intelligent end-to-end security management of the Internet, systems and applications infrastructure. M.Tech selectively partners with market-leading vendors who are established in their respective domains, covering a broad spectrum of today’s security requirements, from firewalls, web security, intrusion prevention and anti-spam to security analytics.About Carbon Black Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks. For more information Marie Evans Asia-Pacific Marketing Director, Carbon Blackmarie.evans@carbonblack.com +61 (0) 412 044 072