About Sara
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.
Stories by Sara - Page 123
Intel Security study reveals huge disconnect between IT execs and staff about cybersecurity strategy
Tue, 7th Mar 2017
#
cybersecurity
#
intel
#
strategy
IT executives & staff disagree on cybersecurity strategy: 60% of IT execs think their strategy is fully implemented, compared to just 30% of IT staff.
Film Review: T2 Trainspotting - the cast is back for a fitting sequel
Mon, 6th Mar 2017
#
gaming
#
digital entertainment
#
film review
There is depression, heroin, violence, regret, sex, lies and betrayal. But you know what? T2 is actually hell of a lot more upbeat than the first one.
Rubicon Red on track for bumper year with three major milestones
Mon, 6th Mar 2017
#
devops
#
apm
#
software development
DevOps, cloud and consulting provider Rubicon Red shares details of several major announcements that will help the company grow to new heights.
Centrify expands mobile security offerings across ANZ
Mon, 6th Mar 2017
#
mfa
#
iam
#
cybersecurity
Centrify has expanded its ANZ suite of mobile security offerings, and the company says both Windows and Apple-based devices can now get in on the fun.
AISA community to host 'Extraordinary' General Meeting to reinforce future direction
Mon, 6th Mar 2017
#
australian information industry association
#
aisa
#
agm
The Australian Information Security Association (AISA) will be hosting what it has dubbed an 'Extraordinary General Meeting for members this month.
Weekly AU security roundup: Hackers speak out, CyberArk, unpatched software and Yahoo's CEO
Fri, 3rd Mar 2017
#
yahoo
#
cyberark
#
flexera
Nuix got the inside word from cyber hackers themselves about what they do, and why they do it. 50% of hackers change their attack methods for every target.
Yahoo CEO forgoes annual bonus and gives it to employees in wake of data breach fallout
Thu, 2nd Mar 2017
#
breach prevention
#
cybersecurity
#
yahoo
Yahoo CEO Marissa Mayer is foregoing her annual bonus and giving it back to employees after the giant data breach that hit the company in 2014.
Palo Alto Networks snaps up LightCyber for automated behaviour analytics prowess
Thu, 2nd Mar 2017
#
firewalls
#
network infrastructure
#
network security
Palo Alto Networks has paid $105 million for cybersecurity provider LightCyber, so it can fuse automated behavioural analytics into its own platform.
Trend Micro amongst top vendors in NSS Labs Endpoint tests
Thu, 2nd Mar 2017
#
malware
#
dlp
#
cybersecurity
Trend Micro has received one of the highest malware protection scores with no false positives in the NSS Labs Advanced Endpoint Protection Public Test.
Interview: Bring on the barbecue - how IT & OT must work together to build better security
Wed, 1st Mar 2017
#
iot
#
partner programmes
#
supply chain
At 31c0n, BT's Bryan K Fite emphasised the crucial unity of IT and OT for robust security, likening it to a “big barbecue” of collaboration.
CyberArk talks credential privileges, data breach laws and the 'sprint method'
Tue, 28th Feb 2017
#
hyperscale
#
public cloud
#
pam
Cybersecurity company CyberArk is employing hackers to fight against cyber threats and develop innovative security solutions.
Australia's vulnerabilities unmasked as survey reveals top unpatched & old programs
Tue, 28th Feb 2017
#
flexera
#
security vulnerabilities
#
patching
The average private user has 77 programs on their PC and 7.1% of those are at the end of their life (EOL) and no longer patched by the vendor.
Sophos launches new suite for cloud security and IoT management
Tue, 28th Feb 2017
#
uc
#
firewalls
#
network infrastructure
Sophos Mobile 7 is available now for on-site installation and will be available through cloud-based Sophos Central in mid-March 2017.
Cybercrime is the 'new normal' and organisations must adapt, says RSM Australia
Mon, 27th Feb 2017
#
breach prevention
#
cybersecurity
#
data breach
RSM Australia warns that cybercrime is now 'business as usual' for firms, reinforcing the need to fortify digital defences.
Cylance is now one of the top 50 companies leading the AI revolution
Mon, 27th Feb 2017
#
ai security
#
ai
#
cylance
AI security pioneers Cylance have been named one of Fortune Magazine's '50 companies leading the AI revolution'.
Could deception methods be the new answer to cybersecurity?
Mon, 27th Feb 2017
#
firewalls
#
network infrastructure
#
network security
Firms are unable to detect attackers for almost five months once they are inside systems, but deceiving attackers along the way can slow them down.
Switch vulnerabilities leave critical infrastructure networks wide open to attack
Mon, 27th Feb 2017
#
network infrastructure
#
cybersecurity
#
network switches
US Warns of Critical Vulnerabilities in Industrial Switches Used in Critical Infrastructure Sectors in Australia and New Zealand.
Hackers speak out: New study turns security stats on their head
Mon, 27th Feb 2017
#
endpoint protection
#
edr
#
hackers
The study confirms suspicions that attack methods are becoming ever more unique, with 50% of hackers changing their attack methods for every target.
Is your IT team experiencing alarm fatigue? Create a rapid response to cyber threats
Mon, 27th Feb 2017
#
siem
#
breach prevention
#
logrhythm
IT teams are experiencing 'alarm fatigue' and they are lagging behind. Here's how you can transform your teams to achieve rapid response.
Film review: Logan
Mon, 27th Feb 2017
#
gaming
#
digital entertainment
#
film review
The sound in itself is visceral; this film is well worth seeing on the big screen for the aural experience alone.