Myth-busting assumptions about identity governance - SailPointThe identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
NZ ISPs issue open letter to social media giants to discuss censorship
Content sharing platforms have a duty of care to proactively monitor for harmful content, act expeditiously to remove content which is flagged to them as illegal.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
Bitdefender invests in A/NZ with new offices and regional director
Bitdefender has opened its Partner Advantage Network (PAN) programme with the aim of recruiting and supporting its over 500 local resellers.
Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.
Online attackers abusing Kiwis' generosity in wake of Chch tragedy
It doesn’t take some people long to abuse people’s kindness and generosity in a time of mourning.
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
IoT and DDoS attacks: A match made in heaven
A10 Network’s Adrian Taylor uses findings from a number of reports to illustrate his point that advances in technology are facilitating cybercrime.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.
Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
CERT NZ: Email extortion & scams hit Kiwis hard in the pocket
Despite ongoing efforts to raise awareness about online scams and fraud, New Zealanders are still losing staggering amounts of money.
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.Download
How to optimise the performance of SIEMs
Optimising your SIEM is most easily and effectively done by also optimising your log management.
Know thy customer - what security concerns Kiwis are most worried about
Regardless of what sector your business operates in, customers need to be able to trust the organisations they deal with.Download
NATO picks BlackBerry's encrypted voice technology to secure calls
The NCI Agency acquires, deploys and defends communication systems for NATO's political decision-makers and command centres
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.Download
Interview: Why log management is crucial to modern business
One Identity's IT veteran Balázs Scheidler shares his insights on log management's history and where it's going to next.
Accenture Security launches IAM capability for user privileges
When it comes to managing user privileges, the provisioning of access should be based on precise knowledge of who a person is and why they need it.
Tech community rocked by deaths of Atta Elayyan and Syed Jahandad Ali
Both men were among the 50 killed in the shooting in Christchurch last Friday when a gunman opened fire at two mosques.
D-Link’s latest 5-megapixel surveillance cameras
The two cameras have been designed with robustness and durability in mind and are able to withstand a range of adverse conditions.
Equality a powerful multiplier of workplace innovation - Accenture
Accenture research found that employees’ willingness and ability to innovate is nearly five times higher in companies with a robust culture of equality.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.Download
Tech firm launches data privacy toolkit to help navigate the minefield
Data privacy isn't just about keeping customer information safe, says Data Insights.
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Where to from here? Women in cybersecurity speak up
International Women’s Day is an opportunity to reflect on how far the industry has come in treating women more equally, but also to rally together and look at how this can be improved.
Unisys women offer advice on how to build a career in IT
"Be brave and accept the challenge because the IT industry offers diverse opportunities for someone willing to have a go."
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.Download
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Carbon Black integrates with Chronicle security analytics platform
Backstory will correlate telemetry from Carbon Black’s endpoint detection and response (EDR) solution to deliver incident investigation and threat hunting.
Privacy Bill may limit breach fines to $10,000
The Privacy Commissioner was seeking maximum breach fines of up to $1 million against body corporates.
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
VMware launches service-defined firewall
VMware’s new internal firewall solution locks down known good behaviour at both the network and host level to reduce the attack surface.
Kathmandu breached, customer information accessed
Kathmandu is notifying potentially affected customers directly and has advised them to change their passwords for its online loyalty programme.
Why NZ could become a global blockchain leader
“If these technologies are going to serve society then we need to solve the problem of giving one vote to one human, we need the social layer, not just the technological layer.”
Whitepaper: Five essential steps to protect your company’s critical data
The increase in devices being used by employees and the number of cloud apps necessitate multiple different channels of accessing a company’s information in a secure manner.Download
Crime-busting software scoops PM's Science Prize
“DNA profile analysis is a really powerful tool for identifying individuals as possible suspects but it’s also important for being able to exclude or exonerate an individual as well.”
Cloud security: What you need to know before you make the move
Thinking about moving your business to the cloud? Often there’s a misconception that businesses can simply ‘set and forget’ when it comes to security, but that’s not always the case.
Check Point names February’s most disruptive malware
Check Point’s researchers confirm Coinhive holds the top position in February's Top Malware index for fifteenth successive month before it shut down, while GandCrab distribution campaigns increase.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.
How business leaders must prioritise cyber risk - Palo Alto Networks
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
Governments playing catch-up with the changing face of crime
Webroot’s Dan Slattery shares how cybercrime has changed in recent years - and why governments around the world are still far behind.
Asia Pacific feeling financial brunt of breaches - but it's not all bad news
CISOs are now acknowledging the adage of ‘it’s not about if there’s a breach, but when’.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.Download
Healthcare breaches down, but impacts more significant - Bitglass
Of the 11.5 million individuals affected by healthcare breaches in 2018, 67% had their information exposed by hacking and IT incidents.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
Whitepaper: How to improve your cybersecurity sales pitch
Boards and executives who normally approve funding for IT security projects do not speak tech - they speak the language of ROI, NPV, etc.Download
LogRhythm launches solution to address network-borne threats
“Security teams are often understaffed, overwhelmed by false positives and lack the necessary network visibility.”
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
Cradlepoint debunks common connectivity and security myths
Many misconceptions have arisen, causing businesses to fear adopting new technologies.
Interview: Cisco on NZ's innovation economy - and where it needs to improve
New Zealand is a little behind the times when it comes to security, but it does particularly well at innovating at speed.
Was Citrix unaware of its own data breach until the FBI got involved?
According to a blog post from Citrix’s CSIO Stan Black, the FBI contacted Citrix on March 6 and advised that international cybercriminals had allegedly gained access to Citrix’s internal network.
Why it’s time to move ID card issuance to the cloud
Many smartcards are still issued from standalone printers tied to a dedicated PC workstation, which creates challenges and unnecessarily bottlenecks the process.
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.Download
How cybercriminals are targeting Kiwi businesses
Kiwis are fundamentally at risk with the top three biggest cyber threats being ID theft, credit card fraud and viruses/hacking.Download
How Veritas aims to enhance the protection of enterprise data
“We’re making it simpler for customers to access critical information about their infrastructure and providing them with a one-stop shop for all reporting requirements."
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.Download
SolarWinds extends database anomaly detection
As organisations continue their transition from purely on-premises operations into both private and public cloud infrastructures, adapting their IT monitoring and management capabilities can pose a significant challenge.
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Healthcare breaches on the rise - here’s how Philips protects data
As healthcare becomes increasingly digitalised, medical institutions need to ensure the systems they are using are storing patient data in a reliable and secure way.Download
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
Whitepaper: Microsoft’s tips for designing a socially responsible cloud
Microsoft has put together a resource for anyone wanting to build a trusted, inclusive, and responsible cloud.Download
Updated: NZ ISPs block internet footage of Christchurch shootings
2degrees, Spark, Vodafone and Vocus are now blocking any website that shows footage of the mosque shootings.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
Maximising blockchain’s potential with privilege controls - CyberArk
While blockchain itself is considered to be ‘safe’, vulnerabilities can be targeted on the endpoints.
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.Download
Sonicwall announces network, cloud apps, endpoint protection solution
SonicWall introduced new cloud-managed Wi-Fi access points and wireless planning tools designed to ease the deployment of global wireless networks.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.Download
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.Download
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."Download
Okta to acquire Azuqua to connect business apps in the enterprise
The average Okta customer has 83 cloud apps, and 9% of customers have more than 200 cloud apps.
Whitepaper: Microsoft's tips for implementing a secure hardware solution
Making big IT decisions that affect your department and organisation as a whole brings up many concerns.Download