archTIS shortlisted for Microsoft Security Excellence Award
The global provider of secure data-centric software solutions, archTIS, has declared itself a finalist for the Compliance & Privacy Trailblazer...
The global provider of secure data-centric software solutions, archTIS, has declared itself a finalist for the Compliance & Privacy Trailblazer...
Scality, an international leader in secure and sustainable data storage software, released a survey today shedding light on the role...
OneLogin and Okta are two industry-leading identity and access management (IAM) platforms used to secure user access to corporate resources...
Organizations continue to race against cybercriminals to keep their systems secure by focusing on defensive measures, including addressing supply chain...
Cisco addressed severe flaws in its Secure Client Pierluigi Paganini March 08, 2024 Cisco addressed two high-severity vulnerabilities in Secure...
Norton Secure VPN is a fast-performing VPN solution from popular security provider Norton. In this article, we walk you through...
Passwordless authentication is a more secure method of granting access to systems. Typically, it works by verifying something unique to...
The metro railway to serve Nancy-Bird Walton Airport in Western Sydney will get a secure backbone network and data centre...
VPNs provide a secure way to send internet traffic through an encrypted tunnel. This keeps browsing data safe, even over...
Making hot desking secure and accessible on a global scale The first rule of interviewing a CISO at the Australian...
Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security...
A reverse engineering of the firmware running on Ivanti Pulse Secure appliances has revealed numerous weaknesses, once again underscoring the...
Secure State, an Australian sovereign Indigenous cybersecurity establishment, has joined forces with the archTIS Channel Partner Program. This partnership, which...
Ivanti warns of a new auth bypass flaw in its Connect Secure, Policy Secure, and ZTA gateway devices Pierluigi Paganini...