New Zealand's leading source of cybersecurity and threat news
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.
New digital world causing concern for IT auditor recruitment
Nearly 2/3s of organisations say the tech skills gap is already impacting IT audits. A new study identifies the top five skills auditors seek.
Microsoft, DigiCert, Utimaco tackle quantum computing threats
The algorithm could bring the world one step closer to a secure internet of things.
OneSpan uses AI to tackle financial account fraud
Its new solution uses machine learning to protect online and mobile channels, as well as meet compliance requirements for transactional risk analysis
Death by cryptocurrency: Could $190m be lost forever?
Exit scam, or just plain bad luck? Investors in one of Canada’s largest cryptocurrency exchanges will be pondering that very question.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.
Can you reassure customers that their data is safe with you?
New Zealanders are comfortable using their digital identity to interact with government – although they are sceptical about handing it over to commercial or financial organisations.
Personalisation more important than privacy for Gen Z
Gen Z doesn’t just use the internet to connect them, entertain them, sell to them, and build their digital brand, they expect it to.
Legacy applications a ‘healthcare cybersecurity nightmare’
A new whitepaper launched today that sought to bring light to just how dire the cybersecurity situation with hospitals really is.
Veritas strengthens AWS partnership with new competencies
Veritas NetBackup and Backup Exec now support multiple AWS storage classes.
Huawei to Poland: 'We'll build a cybersecurity centre if that's what it takes'
Huawei says it will build a cybersecurity centre in Poland if that’s what it takes to convince the world that it’s a trustworthy organisation.
Interview: Tenable CTO on how companies should measure cyber risk
Rising geopolitical tensions coupled with an expanding attack surface have left governments and organisations vulnerable to targeted attacks.
Whitepaper: Microsoft's tips for implementing a secure hardware solution
Making big IT decisions that affect your department and organisation as a whole brings up many concerns.
Google's new Chrome feature warns about compromised logins
This week Google released extra measures in a bid to provide better security for its users’ data.
Whitepaper: Ransomware is evolving – how is your security keeping up?
Kaseya explores how automation and integration can help organisations stay ahead of security threats.
Germany watchdog calls out Facebook's 'abuse of power'
Bundeskartellamt asserts that Facebook must ask for consent from all users to collect data from within Facebook-owned services and third party websites – or face heavy restrictions on data collection.
Whitepaper: Remote working is great – but is it a security time-bomb?
Simply extending current PC security controls to a mobile fleet is ineffective.
How cybercriminals are targeting Kiwi businesses
Kiwis are fundamentally at risk with the top three biggest cyber threats being ID theft, credit card fraud and viruses/hacking.
Whitepaper: Three quick ways security teams can unlock the executive budget
Boards and Executives who normally approve funding for IT Security speak the language of ROI, NPV, etc.
Online retailer Mighty Ape fixes wishlist privacy flaw
New Zealand online retailer Mighty Ape has been quick to fix issues that publicly shared some customers’ birthdates and product wishlists.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
Facial recognition tech can identify partial images of people
We’re now at the point where technology doesn’t even need an entire image of someone to identify them.
Email fraud increased by 476% in last year - Proofpoint
As these threats continue to grow in volume and sophistication, it is imperative that organisations implement a people-centric security approach.
Security flaw in Xiaomi electric scooters could have deadly consequences
An attacker could target a rider, and then cause the scooter to suddenly brake or accelerate.
617 million stolen records up for sale on dark web
It may not be the first time the databases have been offered for sale.
Whitepaper: Microsoft’s framework for inclusive and responsible cloud policies
Microsoft wants to empower organisations to use technology within a clear ethical and responsible framework.
Cybercrime tools and services becoming increasingly democratised
Findings from Check Point's new report reveal a concerning trend as cybercrime grows increasingly well-managed and accessible.
Threat prioritisation feature announced for Tenable platforms
Predictive Prioritisation enables organisations to focus on the three percent of vulnerabilities that have been or will likely be exploited in the next 28 days.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
Massive jump in email fraud targeting healthcare - Proofpoint
The report analyses more than 160 billion emails sent across 150 countries in both 2017 and 2018 to identify email fraud attack trends.
Bug makes Android phones hackable via PNG image files
This means any application handling PNG files that have been carefully crafted by an attacker can end up running the attacker’s code.
Webroot to be sold for $618.5m
Webroot is about to be sold to data protection firm Carbonite for US$618.5 million after the two companies entered into a definitive agreement this week.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
CrowdStrike opens endpoint protection platform to third-party apps
The CrowdStrike Store leverages the cloud for both scale and telemetry, enabling applications to deliver faster, smarter, and more effective solutions.
Migration away from on-prem data centres stalled by security
Despite the surging cloud adoption that is rife around the world, a new study has revealed there’s still a lack of understanding around security.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
Report finds average DDoS attack volumes have trebled in past year
"The increase in the impact and complexity of attacks continues unabated," says Link11 COO Marc Wilczek.
Four ways the technology landscape will change in 2019
Until now, organisations have only spoken about innovative technologies somewhat theoretically. This has left people without a solid understanding of how they will ultimately manifest in our work and personal lives.
The ultimate playbook for DNS infrastructure
Advanced DNS solutions can bring legacy systems into the modern age and protect against these potentially crippling DNS attacks.
Interview: Inside the crybercriminal gig economy for bots
Techday spoke to Akamai Asia Pacific security technology and strategy head Fernando Serto about how organisations are being impacted.
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.
Security and mobility app adoption increasing - Okta
The fastest-of-the-fastest growing apps focus on identity-driven security, indicating that companies are taking Zero Trust seriously.
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
Compliance requirements driving better data management - 451 Research
90% of respondents in a 451 Research report say they will significantly increase investment in DataOps technologies this year.
Honeywell upgrades USB protection for ICS environments
Industrial cybersecurity provider Honeywell has doubled down on its protection against USB-based threats towards industrial operators.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.
Whitepaper: Five key ways to lock down BYOD with MFA
IT and security managers need to move beyond usernames and passwords, expanding their use of multi-factor authentication (MFA) to help provide secure and convenient access.
Experts comment on Aus Parliament breach
Late last week, Australian security agencies reported they were looking into a security breach of the Federal Parliament’s network.
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.
Ziften extends proprietary AI/ML security across all endpoints
AI and ML algorithms now work throughout all phases of the Zenith cybersecurity platform.
Report finds automotive industry seriously wanting in cybersecurity
Findings from a new report have laid the automotive industry’s cybersecurity practices bare after highlighting critical cybersecurity deficiencies.
Palo Alto changes up partner programme
The changes include a dedicated programme for managed services providers and a raft of new processes and initiatives.
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Whitepaper: How to secure your data in a remote world
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.
The top technologies shaping future ‘proactive’ cybersecurity
Frost & Sullivan has highlighted emerging technology trends that are set to change the way enterprises protect themselves against cybercrime.
Illumio eyes global expansion with $65m in the bank
"Regardless of industry or size, every organisation has crown jewel or regulated assets running in their environment."
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.
Extreme Networks launches IoT security solution
IoT devices are typically deployed in a flat or unsegmented network so that if breached, the attacker can gain access to sensitive areas of the network.
Are we security-ready for Alexa in the office?
As home-IoT devices such as smart assistants head into the office, there will be a raft of new security challenges that will need to be addressed.
Mobile security: A case of risk versus reward?
Neither restricting productivity nor accepting tremendous mobile security risk is a viable option.
Frost & Sullivan: Big data is key to preventing cyber breaches
“This technology can proactively predict breaches before they happen, as well as uncover patterns from past incidents to support policy decisions."
Dell EMC expands multicloud data protection capabilities
According to IDC, 92% of organisations have adopted a cloud environment with 64% adopting a multi-cloud approach.
Avoid a game of guess who - get authentication right first time
Analyse the who, what, and where of any person, data, and environment?