CFOtech Australia - Technology news for CFOs & financial decision-makers

Remote Access stories

Zero trust enterprise network all devices segmented connections

Netskope, Forescout expand zero trust to all devices

3 days ago
#
firewalls
#
hyperscale
#
network security
Netskope and Forescout link tools to push zero trust across managed and unmanaged devices, curbing lateral movement on local networks.
Story 299992

Codific maps five cyber paths threatening power grids

Last week
#
virtualisation
#
dr
#
ransomware
Codific warns power grids face repeat cyberattack patterns and urges utilities to bolster resilience to outages and cascading disruption.
Story 300075

OpenClaw AI assistant surge sparks major security fears

Last week
#
malware
#
phishing
#
application security
A rapid surge in OpenClaw AI assistant use has left tens of thousands of exposed systems and a trail of hijacked tools and malicious add-ons.
Mark

Splashtop links endpoint management with CrowdStrike

Last week
#
ai security
#
edr
#
security operations
Splashtop has integrated its Autonomous Endpoint Management with CrowdStrike Falcon, unifying Windows endpoint status for IT and security teams.
Glowing global cloud network enterprise growth blue green

Cato Networks' ARR surges past USD $350m amid SASE boom

Last week
#
firewalls
#
network infrastructure
#
hybrid cloud
Cato Networks' ARR jumps 43% to top USD $350m as enterprises flock to its SASE platform and investors pour in more than USD $1b.
Secure industrial control room remote access monitoring shield

Xona boosts resilient OT remote access with Platform 5.5

Last week
#
iot security
#
zero trust security
#
cybersecurity
Xona's Platform 5.5 boosts resilient OT remote access with session hold features, centralised governance and wider security integrations.
Global upg. phase 2 partner blog header 1 1200x500px

Upgrade advantage: Why security enhancements matter for MSPs and MSSPs

Last week
#
firewalls
#
vpns
#
digital transformation
For MSPs and MSSPs, next-gen firewall upgrades are now critical to stay secure, competitive and ready for relentless cyber threats.
Untitled design  76

From breach to recovery - 5 ways to prepare your IT team for the unexpected

Last month
#
firewalls
#
data protection
#
dr
When cyber attacks slip through defences, recovery readiness - not just prevention - decides whether your organisation bends or breaks.
Story 299483

Android PromptSpy malware harnesses Gemini for stealth

Last month
#
endpoint protection
#
mdm
#
phishing
PromptSpy Android malware taps Google's Gemini AI to navigate screens, lock itself in recent apps and thwart users' attempts to remove it.
Modern data center control room it admin secure remote monitoring

Vertiv unveils secure KVM platform for remote IT control

Last month
#
network infrastructure
#
encryption
#
hyperscale
Vertiv launches Avocent MergePoint Unity 2 KVM, promising secure, centralised remote management for data centres, edge sites and branches.
Server room night encrypted code swirls malware cracked shield

WatchGuard warns of surge in evasive, encrypted malware

Last month
#
malware
#
firewalls
#
ransomware
WatchGuard reports a 1,548% surge in new evasive malware and a 2,000% jump in encrypted threats, straining signature-based defences.
Cinematic data center night firewall crack ransomware attack icon

Barracuda links 2025 ransomware wave to firewall flaws

Last month
#
firewalls
#
data protection
#
ransomware
Barracuda warns that unpatched firewalls and weak accounts drove 90% of 2025 ransomware attacks, as threats spread in mere hours.
Jose correa

Goodbye VPNs, Hello cloud-delivered Zero Trust

Last month
#
firewalls
#
network security
#
cloud security
SonicWall's Cloud Secure Edge promises easy, cloud-delivered Zero Trust to replace ageing VPNs with simpler, stronger remote access.
Australian it office secure remote endpoint management illustration

Splashtop, Leader partner on secure remote access push

Last month
#
data protection
#
encryption
#
partner programmes
Splashtop taps Australian distributor Leader to push secure remote access and autonomous endpoint management for hybrid workforces.
Cornelius mare

SD-WAN is the SASE foundation enterprises can't ignore

Last month
#
firewalls
#
network infrastructure
#
hybrid cloud
Enterprises rushing to adopt SASE must modernise with SD-WAN first, or risk poor performance, fragmented visibility and weak security.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Last month
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Dim server room windows rack red warning remote access breach

Active exploitation seen in BeyondTrust access flaw

Last month
#
firewalls
#
network security
#
pam
Arctic Wolf says attackers are actively exploiting a critical BeyondTrust vulnerability in self-hosted remote access systems.
Dark moody captcha puzzle morphing into shadowy cyber thief scene

LummaStealer returns post-takedown with ClickFix ruse

Last month
#
mfa
#
phishing
#
advanced persistent threat protection
LummaStealer roars back after domain takedown, using fake CAPTCHA ClickFix tricks and CastleLoader to spread via routine user actions.
Cybersecurity engineer in dim ops room green cli devops monitor

Keeper adds SuperShell terminal for secure vault work

Last month
#
devops
#
pam
#
mfa
Keeper rolls out SuperShell, a full-screen terminal interface in Keeper Commander for keyboard-first, zero-trust vault and PAM workflows.
Visions of cb header

Visions of cyber attacks: The SonicSentry SOC in action on Christmas morning

Last month
#
firewalls
#
data protection
#
network security
While most slept through Christmas dawn, SonicSentry analysts foiled a 3am brute-force cyber attack on a French client's firewall.