All articles
9 News
Smart fridge goes viral after update leaves owner thirsty
A photo of an uncooperative smart-fridge has gone viral online after a women vented her frustration with an appliance on Twitter
IT Brief AU
IoT drives the need for smart patching to avoid downtime
The Internet of Things (IoT) continues its rapid rise to prominence around the world.
Security Brief AU
IoT drives the need for smart patching to avoid downtime
The Internet of Things (IoT) continues its rapid rise to prominence around the world.
Business Insider Australia
I just wanted some water': An uncooperative fridge is going off on Twitter
The internet of things has been touted in recent years as the next big technological revolution -- anything from cars, toasters, garden sprinklers and pets would be connected to the internet, sending out information and taking instructions.
IDG Connect
What will be the single biggest security threat of 2017?
At the very end of 2015 we ran a straw poll of individuals in the security space to determine what the single biggest security threat of 2016 would be.
IT Pro Portal
Keeping a lid on SaaS & infrastructure costs
Are companies actually saving money and spending wisely on their cloud infrastructure?
DevOps Online
Security Vulnerabilities and the Cloud
When software is the lifeblood of every enterprise, CIO must understand whether they are buying too much software, legally using the applications they have, and adequately securing them from exploit by malicious hackers.
Cambridge Network
Security vulnerabilities and the cloud redefine software asset management
When software is the lifeblood of every enterprise, CIOs must understand whether they are buying too much software, legally using the applications they have, and adequately securing them from exploit by malicious hackers.
My Business
Revealed: the Most Vulnerable Software Applications
Concerned about your digital security? A US-based software asset management company has revealed its list of the 20 most vulnerable software applications commonly used in business.
Channel EMEA
Security vulnerabilities and the cloud redefining software asset management
Latest Software Pricing and Licencing survey from Flexera Software reveals only 29 per cent of enterprises monitor their systems for unauthorised or unlicensed software for security
CloudTech
How software asset management needs to adapt to changing cloud conditions
A new report issued today by Flexera Software argues that software asset management (SAM) needs to evolve to keep up with software as a service (SaaS) and virtualisation moving into the mainstream.
Pro Secure News Online
Security vulnerabilities and the cloud redefining software asset management
Latest Software Pricing and Licencing survey from Flexera Software reveals only 29 per cent of enterprises monitor their systems for unauthorised or unlicensed software for security
Vigilance
Is Your Security Software Secure?
With security software serving on the front line – protecting individuals and enterprises from hacker threat – it may come up as a surprise that between August and October of 2016 – 11 security products were included on a list of products with the most software vulnerabilities.
CSO
Security Tools are among the Most Vulnerable Software, Researchers Warn
Enterprises are rushing to implement security tools to protect their networked environments -- but those same tools comprised more than half of the 20 most vulnerable-ridden software products based on regular testing during the last quarter, according to new figures from Flexera Software.
Information Security Buzz
Is Your Security Software Secure? Not So Much. One Reason? Vulnerable Open Source Components
New Flexera Software Vulnerability Update Included 11 security products -- many of which used open source components containing vulnerabilities
Infosecurity Magazine
Security Products Riddled with Bugs
Nearly a quarter of the top 20 products with most vulnerabilities in the period August-October this year was security software, according to a new research report from Flexera Software
FedTech
Will the MEGABYTE Act Make Waves in Federal Software Procurement?
The White House’s latest software requirements could generate significant savings, but the jury is out on whether federal CIOs will stand behind the bill.
Security Brief
Software vulnerability management: How ‘intelligence’ helps reduce the attack surface
Each year, thousands of software vulnerabilities are detected in thousands of products.
Vigilance Security Magazine
Microsoft Windows OS vulnerabilities appear to be stabilising after year-long decrease
The percentage of unpatched Microsoft Windows operating systems on private PCs seems to be stabilising after a year of steady decline. But the level of unpatched non-Windows applications on private PCs continues to rise.
iTWire
Licence Optimization: $2 Billion Could Be Saved
Australia has a $2 billion shelfware problem, according to Flexera Software CEO Jim Ryan.