All articles

9 News

Smart fridge goes viral after update leaves owner thirsty

A photo of an uncooperative smart-fridge has gone viral online after a women vented her frustration with an appliance on Twitter
IT Brief AU

IoT drives the need for smart patching to avoid downtime

The Internet of Things (IoT) continues its rapid rise to prominence around the world.
Security Brief AU

IoT drives the need for smart patching to avoid downtime

The Internet of Things (IoT) continues its rapid rise to prominence around the world.
Business Insider Australia

I just wanted some water': An uncooperative fridge is going off on Twitter

The internet of things has been touted in recent years as the next big technological revolution -- anything from cars, toasters, garden sprinklers and pets would be connected to the internet, sending out information and taking instructions.
IDG Connect

What will be the single biggest security threat of 2017?

At the very end of 2015 we ran a straw poll of individuals in the security space to determine what the single biggest security threat of 2016 would be.
IT Pro Portal

Keeping a lid on SaaS & infrastructure costs

Are companies actually saving money and spending wisely on their cloud infrastructure?
DevOps Online

Security Vulnerabilities and the Cloud

When software is the lifeblood of every enterprise, CIO must understand whether they are buying too much software, legally using the applications they have, and adequately securing them from exploit by malicious hackers.

Cambridge Network

Security vulnerabilities and the cloud redefine software asset management

When software is the lifeblood of every enterprise, CIOs must understand whether they are buying too much software, legally using the applications they have, and adequately securing them from exploit by malicious hackers.
My Business

Revealed: the Most Vulnerable Software Applications

Concerned about your digital security? A US-based software asset management company has revealed its list of the 20 most vulnerable software applications commonly used in business.
Channel EMEA

Security vulnerabilities and the cloud redefining software asset management

Latest Software Pricing and Licencing survey from Flexera Software reveals only 29 per cent of enterprises monitor their systems for unauthorised or unlicensed software for security
CloudTech

How software asset management needs to adapt to changing cloud conditions

A new report issued today by Flexera Software argues that software asset management (SAM) needs to evolve to keep up with software as a service (SaaS) and virtualisation moving into the mainstream.
Pro Secure News Online

Security vulnerabilities and the cloud redefining software asset management

Latest Software Pricing and Licencing survey from Flexera Software reveals only 29 per cent of enterprises monitor their systems for unauthorised or unlicensed software for security
Vigilance

Is Your Security Software Secure?

With security software serving on the front line – protecting individuals and enterprises from hacker threat – it may come up as a surprise that between August and October of 2016 – 11 security products were included on a list of products with the most software vulnerabilities.
CSO

Security Tools are among the Most Vulnerable Software, Researchers Warn

Enterprises are rushing to implement security tools to protect their networked environments -- but those same tools comprised more than half of the 20 most vulnerable-ridden software products based on regular testing during the last quarter, according to new figures from Flexera Software.
Information Security Buzz

Is Your Security Software Secure? Not So Much. One Reason? Vulnerable Open Source Components

New Flexera Software Vulnerability Update Included 11 security products -- many of which used open source components containing vulnerabilities
Infosecurity Magazine

Security Products Riddled with Bugs

Nearly a quarter of the top 20 products with most vulnerabilities in the period August-October this year was security software, according to a new research report from Flexera Software
FedTech

Will the MEGABYTE Act Make Waves in Federal Software Procurement?

The White House’s latest software requirements could generate significant savings, but the jury is out on whether federal CIOs will stand behind the bill.
Security Brief

Software vulnerability management: How ‘intelligence’ helps reduce the attack surface

Each year, thousands of software vulnerabilities are detected in thousands of products.
Vigilance Security Magazine

Microsoft Windows OS vulnerabilities appear to be stabilising after year-long decrease

The percentage of unpatched Microsoft Windows operating systems on private PCs seems to be stabilising after a year of steady decline. But the level of unpatched non-Windows applications on private PCs continues to rise.
iTWire

Licence Optimization: $2 Billion Could Be Saved

Australia has a $2 billion shelfware problem, according to Flexera Software CEO Jim Ryan.