About Sara
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.
Stories by Sara - Page 43
New GhostHook attack technique outsmarts Microsoft PatchGuard
Mon, 26th Jun 2017
#
microsoft
#
cyberark
#
patching
CyberArk Labs researchers made the proof-of-concept last week, saying that GhostHook could be a major threat once attackers have control of devices.
Six essential steps to a successful cybersecurity program
Mon, 26th Jun 2017
#
endpoint protection
#
risk & compliance
#
edr
Firms are at a disadvantage in the fight against cybercriminals but building a mature cybersecurity program can help overcome those problems.
How to be successful with multi-cloud management strategies
Fri, 23rd Jun 2017
#
datacentre infrastructure
#
public cloud
#
multi-cloud
Gartner statistics show that public cloud spending exceeded $5 billion last year. With that in mind, how do you fit multi-cloud with your IT strategy?.
Cisco tackles 'previously unsolvable' challenges with network of the future
Thu, 22nd Jun 2017
#
network infrastructure
#
sdn
#
naas
Cisco is gaining ground in artificial intelligence for its networking & security solutions, touting it as 'one of the most significant breakthroughs'.
Gartner reveals the top security technologies in 2017
Wed, 21st Jun 2017
#
devops
#
application security
#
devsecops
The top threats and critical areas for protection provide opportunities for managed security service providers and the channel.
Tata Communications boosts IZO private cloud across Asia & Europe
Wed, 21st Jun 2017
#
private cloud
#
hyperscale
#
healthtech
Tata Communications has expanded its new fully-managed IZO Private Cloud service to multiple countries including Malaysia.
How to manage data analytics so all users can make sense of the insights
Wed, 21st Jun 2017
#
data analytics
#
martech
#
planning
Data analytics are only worth the time if firms can make smarter decisions faster than their competitors. But it's easy to get swept up in the flood.
South Korean web hosting provider pays $1m ransomware demand
Wed, 21st Jun 2017
#
malware
#
ransomware
#
crypto
South Korean web hosting company Nayana was hit by the Erebus ransomware and is paying 397.6 Bitcoins, the equivalent of US$1 million.
SMX rolls out email security for Office 365, Gmail & third party integration
Tue, 20th Jun 2017
#
email security
#
cybersecurity
#
microsoft
SMX has launched its SMX email security suite for third-party cloud email services, meeting demand for improved email security.
Kaseya launches new two-factor security platform for MSPs
Tue, 20th Jun 2017
#
mfa
#
it automation
#
iam
Kaseya has launched a new custom-built security platform for MSPs, built in part due to increasing cyber attacks from APT10.
It's time for MacRansom: New ransomware goes after MacOS
Mon, 19th Jun 2017
#
malware
#
firewalls
#
network infrastructure
Fortinet has warned of a Ransomware-as-a-Service (RaaS) that is making its home on a webportal hosted on the TOR network.
How to find out the true value of network risk reduction
Mon, 19th Jun 2017
#
firewalls
#
network infrastructure
#
network security
Networks may make up part of business infrastructure growth, but how do businesses make the most out of any new network & security monitoring tools?.
NSW Govt seeks 10 security & fintech startups for Israel accelerator program
Mon, 19th Jun 2017
#
fintech
#
government
#
accelerator
The NSW Government is looking for 10 cybersecurity and fintech startups to find out more about Israel in an event at TechSydney tonight, June 19.
'Dangerous' Industroyer malware linked to industrial cyber attacks
Fri, 16th Jun 2017
#
malware
#
iot
#
iiot
ESET has posted a warning that critical infrastructure worldwide could be vulnerable to the cybercriminal group Industroyer.
Interview: The dark side of biometrics - why social engineering could destroy security
Wed, 14th Jun 2017
#
biometrics
#
mfa
#
fintech
Biometric technology may not be suitable for financial institutions due to security concerns and the risk of social engineering.
Fujitsu incorporates blockchain to secure data exchange networks
Mon, 12th Jun 2017
#
data protection
#
blockchain
#
fujitsu
Fujitsu champions blockchain to bolster secure data sharing, aiming for swift, safe exchanges across various industries.
HPE's industry-first puts silicon at the forefront of server security
Mon, 12th Jun 2017
#
datacentre infrastructure
#
encryption
#
supply chain
The industry-first development features embedded silicon-based security into HPE's next-generation ProLiant servers.
Impersonation attacks rise 400% as email security struggles to keep up
Mon, 12th Jun 2017
#
malware
#
cybersecurity
#
email
20% of risky emails bypass security systems, according to Mimecast. Attacks like impersonation grew by 400% QoQ.
Commvault & AWS alliance: A progressive look at the journey to cloud
Thu, 8th Jun 2017
#
hyperscale
#
public cloud
#
multi-cloud
Data is the heartbeat of your organisation, and during the journey to cloud, it's important to make sure that data stays with you along the way.
Thursdays are the most dangerous days for our inboxes, Proofpoint finds
Thu, 8th Jun 2017
#
phishing
#
email security
#
cybersecurity
Be especially wary of the dangers lurking in your inbox on Thursdays - because that's when malicious email attachments are likely to spike.