Access stories

IT leaders see cloud infrastructure as leading cyber risk source
3 days ago
#
cloud services
#
user data
#
cloud infrastructure
A study by Tenable shows that 68% of Australian IT leaders view cloud infrastructure as a chief source of cybersecurity risks.

Doorda partners with Point Sigma to enhance data-driven insights for businesses
Last week
#
collaboration
#
customers
#
stakeholders
Doorda joins forces with Point Sigma, enhancing data-driven insight capabilities for firms like Funding Circle.

British Land introduces digital wallet access for London office building
Last month
#
apple wallet
#
self-service
#
london
British Land teams with SwiftConnect and HID to provide digital wallet access at Broadgate's 100 Liverpool Street office in London.

Cohesity launches SmartFiles on Snowflake Data Cloud for advanced data analysis
Last month
#
integration
#
cohesity
#
management
Cohesity announces the launch of SmartFiles on Snowflake Data Cloud, intended to enhance data analysis and ensure compliance.

Kordia to deliver business-grade satellite services via Netlinkz Starlink partnership
Thu, 26th Oct 2023
#
satellites
#
kordia
#
innovation
Kordia has partnered with Netlinkz to offer business-grade, high-speed satellite services via Starlink, enhancing rural coverage.

Zero Trust security goes mainstream, reveals Okta's 2023 report
Thu, 26th Oct 2023
#
it infrastructure
#
identity
#
okta
Zero Trust security has now become mainstream, with 61% of organizations adopting the contemporary framework, according to the latest report by Okta.

OVHcloud introduces advanced Identity and Access Management feature
Mon, 23rd Oct 2023
#
public cloud
#
servers
#
beta
OVHcloud, a leading cloud provider, enhances security with new advanced Identity and Access Management feature.

Groundbreaking AI tutor alleviates exam stress for Australian students
Mon, 16th Oct 2023
#
e-learning
#
history
#
software
Zookal introduces AI tutor 'Exam Prep Zookal Genius' to help students excel in exams, offering personalised learning at an affordable price.

Addressing real-world security challenges with a touch of a finger
Thu, 28th Sep 2023
#
biometrics
#
identity
#
fingerprint scanners
Fingerprint biometrics continue to offer the most accurate, efficient and secure solution that addresses real-world challenges faced by enterprises today.

Keeper Security enhances access security with support for passkeys
Tue, 6th Jun 2023
#
pam
#
passwords
#
keeper security
Keeper Security announces support for passkeys, a passwordless authentication method, on its platform, making logins more secure and seamless.

SALTO Systems acquires UK technology innovator TouchByte
Tue, 23rd May 2023
#
cybersecurity
#
innovation
#
facial recognition
SALTO Systems acquires UK tech innovator TouchByte to enhance its secure face recognition access control solutions.

Console Connect accelerates digital transformation with new launch
Fri, 7th Apr 2023
#
cloud services
#
network infrastructure
#
digital transformation
Console Connect has launched a new Access Port service, which enables businesses to plug directly into the Console Connect platform from locations worldwide.

OECD adopts privacy safeguards while accessing personal data
Fri, 16th Dec 2022
#
oecd
#
digital economy
#
privacy
The agreement is on approaches to safeguarding the privacy and other freedoms when accessing personal data for national security and law enforcement purposes.

Cloudflare brings Data Localisation Suite to more APAC businesses
Tue, 27th Sep 2022
#
ddos
#
data protection
#
asia pacific
Cloudflare's Data Localisation Suite is now available in Australia, India, and Japan, helping businesses comply with data localisation obligations.

‘Windows shops’ target admin rights to de-risk their environments
Wed, 17th Aug 2022
#
cybersecurity
#
windows
#
users
New data shows up to 75% of critical vulnerabilities could be mitigated through a rights and privileges crackdown.

Demand grows for future-proof mobile access solutions
Tue, 16th Aug 2022
#
smartphones
#
report
#
security
HID Global, in partnership with IFSEC Global, recently released the 2022 State of Physical Access Control report for the fourth year running.

How to increase the success rate of business data projects
Mon, 15th Aug 2022
#
bi
#
big data
#
data analytics
New Zealand organisations must embrace data-driven innovation to navigate post-COVID challenges and drive growth, says report.

High level of Customer Identity & Access Management adoption
Wed, 10th Aug 2022
#
idc
#
okta
#
access
The study from Okta revealed that the pandemic has either accelerated or highlighted the need for digital-first strategies.

TrustRadius gives M-Files two document management awards
Mon, 8th Aug 2022
#
printing
#
document management
#
ecm
TrustRadius has recognised M-Files with both a 2022 Best Feature Set and a 2022 Best Relationship award in document management.

Microsoft Entra - the new branch for identity and access solutions
Wed, 1st Jun 2022
#
microsoft
#
cybersecurity
#
multi-cloud
Microsoft launches its new Microsoft Entra product family and announces three new solutions: Permissions Management, Verified ID and Identity Governance.

ForgeRock releases Autonomous Access solution powered by AI
Fri, 13th May 2022
#
ai
#
analyst report
#
cyber attacks
ForgeRock has officially introduced ForgeRock Autonomous Access, a new solution that uses AI to prevent identity-based cyber attacks and fraud.

Developments in phishing and how to protect your business
Mon, 9th May 2022
#
dr
#
phishing
#
email security
Phishing attacks are becoming more organized and dangerous. This article discusses strategies to defend against them.

The rising importance of cloud ID and access management in an increasingly online world
Fri, 4th Mar 2022
#
cloud services
#
iam
#
it infrastructure
Australian businesses face a growing array of sophisticated cyberthreats aimed at breaching networks, stealing data, and causing disruption.

The growing importance of establishing effective API security
Wed, 2nd Mar 2022
#
identity
#
cybercriminals
#
secure code warrior
Cybercriminals have tended to focus on acquiring user credentials to maximise their ability to traverse targeted IT infrastructures.