New Zealand's leading source of cybersecurity and threat news
Exclusive: Aruba APAC CTO talks next steps for the region
“So suddenly, in our region, we have become almost early adopters of these new shifts in technological revolutions.”
You’re invited – Artificial Intelligence in the Enterprise summit 2018
Designed for the C-suite, CTOs, directors, and business professionals, this summit gives you the chance to explore AI. It can help you network, spot potential areas of concern, and how your business can make the most of AI.
Cyber threat spotlight: Kiwis report more, lose less in Q2
CERT NZ’s April-June 2018 Quarterly Report suggests that cyber threats – and the amount of people who are reporting them – are once again on the rise, and fewer people are losing money.
Security Technology Alliance
Domain Name Commission
Internet of Things
Acronis Disaster Recovery Cloud
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Review: Cut through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
The quick guide to understanding cybercriminals' motivations
Check out this incredibly helpful and interesting guide to exactly what cybercriminals are after, and how you can keep yourself safe.
Whitepaper: How businesses can buff up their cyber defences
By 2020, 60% of digital businesses will suffer major service failures due to the inability of IT security teams to manage digital risk.
Study: Proactive approach needed in handling cyber threats
30% of security practitioners don’t believe their organisations are equipped to handle security threats.
Nozomi Networks and The Missing Link team up to deliver industrial cybersecurity solution
Threat actors are increasingly targeting industrial control systems (ICS) in manufacturing and critical infrastructure.
The good and bad of Office 365 security
Let’s start with the positives. Office 365 adoption, and going cloud in general, is good for security.
CrowdStrike and Secureworks partner to integrate UEBA and endpoint protection platform
When the joint offering becomes generally available, both Secureworks and CrowdStrike customers will have access from additional countermeasures driven by the integration.
Domain Name Commission wins lawsuit against US intelligence firm DomainTools
"The ruling temporarily puts to an end DomainTools’ bulk harvesting of .nz domain holders’ personal information and selling that data for a profit."
How voice biometric solutions reduce friction and cut fraud
"By deploying voice biometric solutions, organisations are able to authenticate customer transactions instantly."
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
New online tool helps organisations evaluate security maturity
The report also assigns a current security maturity tier and compares the organisation’s results to peer benchmarks.
Research finds majority of businesses failing to comply with GDPR
70% of companies couldn’t fulfil data access and portability requests within the GDPR-specified one-month time limit.
2018 proves to be a mixed bag of severe cyber threats, report finds
There are more than 100,000 known vulnerabilities that are open to exploitation from attackers.
BlackBerry to roll out EoT platform by end of 2018
BlackBerry has unveiled a new Enterprise of Things (EoT) platform that enables OEMs to produce ‘things’ with high levels of security and safety.
Interview: CA Technologies explores the state of digital trust in APJ
A recent survey by CA Technologies found that 40% of APJ executives have sold customer data, although many cybersecurity pros aren’t actually aware that this happened. How is this possible?
Protecting New Zealand in the new cybercrime threatscape
New Zealand’s businesses are digitally transforming, supported by good internet infrastructure, and immersed in a culture of innovation.
WatchGuard launches multi-factor authentication solution aimed at SMBs
WatchGuard’s AuthPoint solution is a cloud service that can be deployed and managed from any location without the need for expensive hardware components.
Entry deadline extended for the 2018 iSANZ Awards
New Zealand’s talented security businesses and individuals now have extra time up their sleeves to enter this year’s iSANZ awards.
Exclusive: Simplifying data management, protection and recovery
"It is more critical than ever that organisations know what data they have and where that data is located."
Fortinet adds network access control solution for IoT
FortiNAC provides visibility and control of IoT services and automated response to threats at scale in multi-vendor environments.
Why enterprises are still grappling with data loss
Survey results show that many organisations are not following baseline best practices for data protection and disaster recovery.
Yubico to provide hardware security key with Okta’s MFA
YubiKeys, hardware-based protection in the form of physical devices, provide an option for a second factor in Okta MFA.
Our new look: A user experience revolution and a stronger content focus
We’re excited about how this new look reflects what we believe in delivering.
emt Distribution signs exclusive A/NZ deal for malware analytics
VMRay’s malware analysis solution to helps to deepen partner’s capabilities to evaluate the cyber threat landscape
Bitdefender invests in APAC with acquisition of SMS eTech business line
From its base in Melbourne, the new Bitdefender Australia office will retain all current employees of SMS eTech working on the Bitdefender business line.
HID Global releases new access control solution into A/NZ market
SMBs are 4x more likely to be victims of crime than homes are, a statistic HID Global is looking to tackle with its latest security solution.
New research reveals which employees are being targeted for why
Individual contributors and lower level management account for nearly two thirds (60%) of highly targeted attacks within an organisation.
Azure platform exploited the most for DDoS attacks – report
Research found a 35% increase DDoS attacks using public cloud server-based botnets from the previous 12 months.
More than 40% of ICS computers were attacked in H1 2018
Cyber attacks on industrial computers are considered to be an extremely dangerous threat as they cause material losses and production downtime for a whole system.
Managing OT cybersecurity vulnerabilities at industrial facilities – PAS Global
Focusing on Level 2 endpoints gives only a surface view because they make up only 20 percent of endpoints that exist in process control networks.
Challenges in a new dawn of data protection - Commvault
Companies today are able to generate more data at a faster rate and it is more accessible to a larger number of users.
Survey: Rising role of IT in physical security provides opportunities
In addition to taking care of cybersecurity, IT departments are having to adapt to spearhead issues set forth by the physical security dept.