GitHub amps up vulnerability reporting capabilities
GitHub has announced new capabilities that make it easier for developers to report vulnerabilities directly from their repositories.
CrowdStrike establishes early-stage investment fund with Accel
DNS amplification attacks increase 1000% since last year - Nexusguard
Acronis True Image 2020 automates 3-2-1 backups
IoT a hot topic in cybercriminal underbelly
Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard
Number of attacked medical devices declines globally, but not in APAC - Kaspersky
Are they listening? Kiwis wary of smart devices
While talking aloud, a voice-activated, home-based smart speaker asked for more info - even though it was not turned it on.
How to manage Windows 10 like a smartphone
If only a business’ Windows 10 endpoints could be managed with the same simple, intuitive toolsets as smartphones.
Why businesses need a strategy to combat the enemy within – Ping Identity
While strengthening your organisation’s external defences with the latest tools and technologies makes sound sense, it’s only half a battle plan.
Scale Computing integrates Acronis services into HC3 platform
The Scale Computing HC3 platform will now include Acronis Backup, which will deliver data protection, disaster recovery, and threat mitigation.
Does your security team need a boost from an MSSP partnership?
Rackspace’s e-book has a practical set of protection measures, providing a framework for security decisions relevant to data centre and cloud infrastructure.
Gartner names Trend Micro leader in endpoint protection platforms
The endpoint is increasingly the frontline in the war against cyber-threats and IT teams are overwhelmed by the volume of alerts they must manage.
Palo Alto Networks expands commitment to NZ market
Palo Alto Networks is expanding its New Zealand business operations in order to better prepare local businesses for growing cybersecurity concerns.
Illusive Networks joins LogRhythm technology alliance partner program
The resulting integration will provide real-time, post-breach threat detection while enhancing and automating incident response.
Ransomware making a comeback, McAfee report finds
McAfee Labs saw an average of 504 new threats per minute in Q1 and a resurgence of ransomware along with changes in campaign execution and code.
Over 50% of incident response requests occur after damage complete – Kaspersky
It is often assumed that incident response is only needed in cases when damage from a cyber-attack has already occurred and there is a need for further investigation.
F&S: Global first responder C3I spending to near US$100 million
Providing solutions that can make cross-agency sharing and access efficient and effective will augment growth prospects, finds Frost & Sullivan.
Apple issues clarification on extent of iOS malware infection
The attack affected fewer than a dozen websites that focus on content related to the Uighur community.
Businesses ignoring security when investing in new tech
Only a quarter of organisations are prioritising security when it comes to technology investment, according to a new report by Advanced.
Rapid data growth becoming major business challenge
StorageCraft research reveals rampant data growth, and inadequate IT infrastructures are a source of global concern and risk.
Five winning strategies for VMware in 2019
We look under the hood at the enterprise software vendors plans for the year.
DTCC and Accenture unveil research on blockchain governance model
The study introduces model that addresses the responsibilities and critical functions in operating and maintaining a private, permissioned DLT platform.
Blockchain revenues to near US$10B despite 2018 crypto winter
This year blockchain is starting to find its feet as innovators find the use-cases that suit the specific areas in which it can provide value.
Digitally transform without fear with consistent security policies
DX carries increased risk, especially as organisations extend their network operations further afield with Operational Technology (OT) and tap into new opportunities with 5G.
Advanced Security named as NZSA Security Integrator of the Year
The company also won an award for staff retention and development, and one of its staff was recognised as professional of the year in his sector.
Gartner: Blockchain to be “transformational” within a decade
Gartner’s 2019 Hype Cycle for Blockchain Business shows that blockchain will have a transformational impact across industries in 5 to 10 years.
Tapping into SD-WAN’s productivity gains without the security concerns
If you can migrate all of your security requirements to a single, interoperable security fabric, you can reduce your operational overheads significantly.
Understanding the shifting paradigm of the threat landscape
“The ability of threats to persist has made the whole idea of prevention obsolete.”
Proofpoint and CrowdStrike partner on endpoint protection integration
In the first technology integration, Proofpoint will check potentially malicious attachments with CrowdStrike Falcon Intel and will add new hashes to the customer’s custom intelligence.
Sophos named Magic Quadrant Leader, changes up APAC channel staff
This is the 11th time in a row Sophos has been positioned as Leader and shaken up its APAC and A/NZ channel execs.
Google's new approach to machine learning without the privacy worries
We look at a fascinating new approach to machine learning that Google is taking.