Spear phishing techniques evolving to execute lateral attacks – Barracuda
Barracuda’s research uncovered fresh insights into how these popular attacks are evolving and the tactics used by cybercriminals to try to make them successful.
The fascinating way Microsoft is making a social impact
67b emails rejected due to 'highly malicious attack techniques'
You're invited: Define your future at TechX19
Keysight solution helps prevent cyber-attacks on connected vehicles
Jamf extends Apple expertise through security firm buyout
Report: Fortinet releases latest analysis of the cyberthreat landscape
ForgeRock launches open-source IoT edge controller solution
The IoT Edge Controller runs on smart edge devices, and provides the privacy, integrity and security required for devices to register as identities.
ESET: Ignoring human element in cyber safety a mistake
"We believe that when employees are aware of their potential blindspots, they are naturally more invested and better prepared to be wary of things that may not seem quite right."
OutSystems gains new certifications for cloud security compliance
These certifications demonstrate the level of commitment OutSystems has to ensuring the privacy and protection of its customers’ data in the cloud.
Broadcom set to own Symantec’s enterprise security business for $10.7B
"M&A has played a central role in Broadcom's growth strategy and this transaction represents the next logical step in our strategy following our acquisitions of Brocade and CA Technologies," says Broadcom CEO
SentinelOne launches next-gen server protection offering
SentinelOne has released a new next-generation server and protection offering, which is purpose-built for containers.
CIOs – here’s how you get your IT environment digital-ready
It’s no simple task to optimise performance for an array of internal and external applications, particularly when there’s a mixture of cloud and legacy workloads that intersect.
Business ransomware detections spiking - Malwarebytes
Ransomware attackers are targeting large, ill-prepared public and private organisations with easy-to-exploit vulnerabilities.
Microsoft and CyberArk lead GlobalData identity management theme
Both companies gained the highest score for the identity management theme in GlobalData’s Thematic Scorecard for the security software sector.
Security defensive blue teams failing to catch offensive red teams - Exabeam
35% of respondents claim that the blue team never or rarely catches the red team, while 62% say they are caught occasionally or often.
Understanding VMware in just 4 minutes
We look at the companies history and key technology solutions.
Making secure SD-WAN possible with a comprehensive approach - Fortinet
SD-WAN is changing the way enterprises offer access to branch offices - but securing SD-WAN can be challenging.
F5 Networks' BIG-IP load balancer product vulnerable to attack
Organisations that use F5 Networks BIG-IP load balancer should immediately check their configurations to ensure they are protected from potentially serious security issues.
430,000 people hit with financial malware
Financial malware, that is malware that targets finances, cryptocurrencies and web-money services, has increased by 7% from the same period last year, according to new research from Kaspersky.
Air NZ faces data breach after staff accounts phished
Air New Zealand says information relating to membership profiles may have been visible on internal documents as a result of the breach.
Yubico launches lightning-compatible security key
Today, the YubiKey 5Ci can be used to secure the 1Password, Bitwarden, Dashlane, Idaptive, LastPass, and Okta iOS mobile applications.
Popular enterprise printers riddled with security risks
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother.
How crucial is cloud expertise to your organisation?
The study surveys more than 950 IT decision-makers and IT pros from across the globe to better understand the barriers to increasing cloud usage.
Limiting access key to minimising data breaches, says expert
"When a company provides only a minimum amount of access needed for the employees to fulfil their roles, the risk of wide-spread breach greatly diminishes."
Slack tackles balance between productivity and security
The new features include more options to protect data without interrupting employees’ requirements to get work done.
BitSight announces enterprise analytics to help security leaders manage risk
The solution provides visibility into which groups have the biggest impact on their organisations' overall cyber risk posture and helps identify areas for security performance improvement.
DDoS attacks on the rise despite taking a summer break
“Traditionally, troublemakers who conduct DDoS attacks for fun go on holiday during the summer and give up their activity until September."
Mobile Mentor solution lets you manage Windows 10 like a smartphone
The solution gives IT managers the ability to holistically manage all endpoints to improve security and employee experience.
DXC Technology & Autism NZ help autistic Kiwis into the workforce
The Enterprise Centre, which is set to open in 2020, will include a cybersecurity centre and technology centre. It will also be one of the world’s first on-site training and learning facilities for autistic people setting out in the workforce.
Security teams spend 25% of their time chasing false positives
The report also showed that teams were also concerned about investigating actionable intelligence and building incident timelines as well as cleaning, fixing and/or patching networks.
Delta launches NZ first: personal cyber insurance
“For the first time in New Zealand, families will really be able to significantly reduce their exposure to hackers and online criminals, but organisations will also benefit," says Delta CEO.