What's new in Microsoft's Sentinel cloud SIEM?
Logging can be the most useful tool in a customer's security arsenal, but it’s something businesses tend to overlook and not assign resources to.
Logging can be the most useful tool in a customer's security arsenal, but it’s something businesses tend to overlook and not assign resources to.
Defending against attacks intended to destroy systems rather than steal or extort requires a different approach, as Russia's cyber attacks against Ukraine demonstrate.
The Log4j vulnerability affects many applications running on Microsoft networks. Use this advice to determine whether your network has been exploited and to mitigate the issue.
Removing barriers to hardening a Windows network and planning a response will minimise disruption from a ransomware attack.
Attackers know how to manage and monitor our systems better than we do. They will analyse how best to gain entrance to our networks.
If you are still running and patching an on-premises Exchange server, you need to opt into a major protection that Microsoft is rolling out.
The discovery of serious vulnerabilities in Azure's Cosmos database and Linux VM shows you can't take cloud security for granted.
Many networked systems will not be compatible with Windows 11 and its advanced security features. Here's how to keep Windows 10 devices from being a weak link.
Attackers are targeting older, unpatched Microsoft Exchange Servers with much success because organisations don't properly assess the risk.
Analysing forensics logs requires a unique approach. Here are the basics of what you need to know and the tools to use.
IT and security admins need to be aware of these unpatched Microsoft vulnerabilities so that they can mitigate them in other ways.
A recent report shows declining confidence in many organisations’ security function to address today’s threats. Here’s why and how security teams can reverse the trend.
It’s usually better to wait when Microsoft releases its monthly updates to avoid potential problems. That’s true for March.
Though there were a few rarified hiccups in last month's batch of patches from Microsoft, most users are good to go to install them.
Criminals fool victims into clicking on malicious links or assisting in financial theft by sending emails that mimic real senders and real companies.
Join key decision-makers within Environmental, Social, and Governance (ESG) that have the power to affect real change and drive sustainable practices. SustainTech will bridge the gap between ambition and tangible action, promoting strategies that attendees can use in their day-to-day operations within their business.
EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.
ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
The roadmap to a low carbon future in technology The IT sector accounts for 2% of global greenhouse gas emissions1. This will rise as data and new technologies increasingly play a central role in shaping organisational operations. As enterprises and governments introduce net zero or decarbonisation targets, IT operations will need to better understand their emissions and how they can be reduced without negatively impacting technology or business operations. SustainTech will bridge the gap between ambition and tangible action, promoting Environmental, Social and Governance (ESG) strategies that attendees can use in their day-to-day operations within their business.
16 November 2023