IoT a hot topic in cybercriminal underbelly
"We've lifted the lid on the IoT threat landscape to find that cybercriminals are well on their way to creating a thriving marketplace for certain IoT-based attacks."
The definitive guide to managed cloud security
Cryptocurrency conundrum: Reserve Bank & IR fumble in the dark
Whitepaper: Protecting your business against advanced persistent threats
Five ways attackers can create havoc in smart homes
Advanced Security named as NZSA Security Integrator of the Year
Security flaw left Android phones open to SMS phishing attacks found
Ransomware modifications double year-on-year in Q2 2019 - Kaspersky
According to Kaspersky data, 232,292 unique users were targeted by such attacks – 46% more than a year ago, in Q2 2018 (158,921).
More than half of personal data breaches caused by human error
"The biggest cause of breaches remains the fallibility of people and an inherent inability of employees to send emails to the right person."
SecurityScorecard launches custom security ratings feature
Custom Scorecard allows enterprise leaders to better isolate and focus on cybersecurity risk issues by business units and/or subsidiaries.
Over 50% of incident response requests occur after damage complete – Kaspersky
It is often assumed that incident response is only needed in cases when damage from a cyber-attack has already occurred and there is a need for further investigation.
Blockchain revenues to near US$10B despite 2018 crypto winter
This year blockchain is starting to find its feet as innovators find the use-cases that suit the specific areas in which it can provide value.
Illusive Networks joins LogRhythm technology alliance partner program
The resulting integration will provide real-time, post-breach threat detection while enhancing and automating incident response.
Spear phishing techniques evolving to execute lateral attacks – Barracuda
Barracuda’s research uncovered fresh insights into how these popular attacks are evolving and the tactics used by cybercriminals to try to make them successful.
DTCC and Accenture unveil research on blockchain governance model
The study introduces model that addresses the responsibilities and critical functions in operating and maintaining a private, permissioned DLT platform.
Comprehensive security empowering business to innovate faster - Fortinet
Adopting a single-vendor and unified Security Fabric approach carries the least amount of risk as your organisation adopts OT, 5G and DX.
Gartner names Trend Micro leader in endpoint protection platforms
The endpoint is increasingly the frontline in the war against cyber-threats and IT teams are overwhelmed by the volume of alerts they must manage.
VMware announces new features on Workspace ONE platform
The new management, security and multi-cloud VDI features will allow IT teams to leverage automation to intelligently manage and secure access to any app, on any cloud.
Fileless attacks surge as attackers look to boost ROI
Fileless attacks have skyrocketed 265% this year compared to the first half of 2018, and there’s no sign that they will slow down.
Palo Alto Networks expands commitment to NZ market
Palo Alto Networks is expanding its New Zealand business operations in order to better prepare local businesses for growing cybersecurity concerns.
Five winning strategies for VMware in 2019
We look under the hood at the enterprise software vendors plans for the year.
The dark side of apps: Security threats on the rise
"Think about it, unsecured Wi-Fi, spoofing, phishing attacks, ransomware, spyware... mobile devices make for the perfect target."
Proofpoint and CrowdStrike partner on endpoint protection integration
In the first technology integration, Proofpoint will check potentially malicious attachments with CrowdStrike Falcon Intel and will add new hashes to the customer’s custom intelligence.
Cloud adoption increases ROI, but more expertise needed
Nearly three-quarters of IT decision-makers (71%) believe their organisations have lost revenue due to a lack of cloud expertise.
Gartner names Ping Identity leader in access management
The solution includes authentication and single sign-on, MFA, access security, directory, intelligent API security and data governance capabilities that work together.
Proofpoint integrates people-centric protection with Okta’s Identity Cloud
The partnership aims to bolster the security posture for organisations’ very attacked people (VAPs) by applying additional adaptive security controls.
Govts risk cyber attacks if they continue to demand encryption backdoors
Governments that flout encryption best practice and mandate the inclusion of backdoors into technology are putting their entire countries at risk, according to security professionals.
F&S: Global first responder C3I spending to near US$100 million
Providing solutions that can make cross-agency sharing and access efficient and effective will augment growth prospects, finds Frost & Sullivan.
Yubico launches lightning-compatible security key
Today, the YubiKey 5Ci can be used to secure the 1Password, Bitwarden, Dashlane, Idaptive, LastPass, and Okta iOS mobile applications.
AlgoSec announces new features to improve Cisco ACI automation and application visibility
AlgoSec A30 release delivers new automation capabilities that enable zero-touch security management across SDN, cloud and on-premise networks.
Fortinet’s security fabric – the antidote to complexity
If you can migrate all of your security requirements to a single, interoperable security fabric, you can reduce your operational overheads significantly.
CrowdStrike establishes early-stage investment fund with Accel
In partnership with Accel, CrowdStrike will co-invest in security startups that are building applications on the CrowdStrike Falcon platform.