Programmable money will redraw the map of international trade
Those who control the most widely used currencies also control a great deal of the global economy, and it is time for New Zealand to get in the game.
Pulse Secure launches new access management and threat mitigation features
Unisys: Staying cyber safe during Rugby World Cup
Qrious attains ISO 27001 data security certification
Get the best out of AWS
Enterprises look to zero trust network access to thwart VPN attacks
How to design a secure data centre network
Securing the unknown with visibility and control
What’s getting in the way of an organisation’s security health and what needs to happen to secure those vulnerabilities? What assets does an organisation own? How does an organisation gain visibility? Where do the assets live? Who has access to those assets?
Fortinet buys out enSilo to bolster endpoint security portfolio
Fortinet has acquired a US-based endpoint security company enSilo as the company continues to flesh out its global security solutions.
Quantum computing will pose risks to enterprise encryption
“It is encouraging to see that so many companies understand the risk and challenges that quantum computing poses to enterprise encryption."
ManageEngine launches holistic take on privileged access security
PAM360 provides governance over privileged access entitlements, correlation of privileged access data with other IT management platforms.
WatchGuard inks distie agreement with Soft Solutions
Soft Solutions will distribute the company’s entire range of network security, W-Fi and multifactor authentication products.
F5 integrates BIG-IQ into Venafi Machine Identity Protection Platform
The integration allows network operations to orchestrate the lifecycle of SSL/TLS certificates and ensure security policies are enforced across devices.
NZ information security award finalists revealed
The iSANZ Awards were established five years ago to recognise the achievements of New Zealanders in the country’s information security (InfoSec) and cybersecurity field.
Elastic launches endpoint security offering
The offering is based on its acquisition of Endgame, a company focusing on threat prevention, detection, and response based on the MITRE ATT&CK matrix.
Alibaba Cloud gains new security accreditations
Alibaba Cloud obtained the Level 3 assessment in TISAX for automotive and Good “x” Practice (GxP) readiness assessment for the healthcare industry.
The dawn of a new age: Google cracks quantum supremacy
It’s the ‘eureka’ moment technologists and scientists have been yearning for.
Women underrepresented in cybersecurity in half of enterprises - Kaspersky
Despite some diversity initiatives, women constitute 39% of the labour force and only 25% of management positions worldwide in general.
ConnectWise acquires Continuum and ITBoost
Together, these moves aim to put more problem-solving resources, tools for efficiency, and fuel for growth in the hands of partners.
Atlassian to integrate Okta’s authentication solution in cloud products
This partnership enables Atlassian to focus on its core products while Okta solves for enterprise identity challenges, securing Atlassian customers.
Ten keys to unlocking cybersecurity automation
Modern cybercriminals are well organized, well-funded, and profit driven. To effectively combat these cybercriminals, enterprise security teams must become crimefighters.
Whitepaper: Biggest barriers to cloud success to conquer them
This paper outlines barriers, impacts, and the required skills to compete in a tech-driven world.
How SMS became the trusted mode of customer communications
About 90 percent of text messages are read within three minutes of receipt and we’re seven times more likely to respond to a text than an email.
Whitepaper: How advanced persistent threats are making threat prevention obsolete
The ability to persist has made the whole idea of prevention obsolete.
Kordia hires its first full-time CISO, Hilary Walton
She is a former 2012 Olympics security manager, and she has worked with British intelligence agency MI5.
Worldwide spending on security products and services set to reach $151.2 billion in 2023
"Considering there have been many attempts for hackers to acquire funds from banks, the banking industry is expected to spend the most on security solutions."
Digital optimisation makes HR processes easier - Hyland
Although we tend to think of data breaches as the work of malicious hackers, carelessness and mishandling of sensitive documents are just as likely to be the culprit.
Gartner names SailPoint Leader in identity governance for the sixth time
Users today encompass both human and non-human users; applications, data and infrastructure are no longer purely on-premise but largely live in the cloud today.
In focus: Real-world stories about security automation
"That’s the path you have to go take, because without automation, you’re an easy target.”
Trustwave introduces dashboard to manage security testing
Through point-and-click navigation, users can scan business-critical applications to search for unpatched vulnerabilities, exploitable code or evidence of malicious activity.
Hackers access NordVPN server, users unaffected
While being connected to the server, the hacker could only see what an ordinary ISP would see, but it could not have been personalised or linked to a particular user.
Microsoft's new security innovations at Ignite 2019
Microsoft 365 and Security corporate vice president Kirk Koenigsbauer outlined 10 major security announcements across Azure, Microsoft 365, Office, and Microsoft Defender ATP.