IoT a hot topic in cybercriminal underbelly
"We've lifted the lid on the IoT threat landscape to find that cybercriminals are well on their way to creating a thriving marketplace for certain IoT-based attacks."
The definitive guide to managed cloud security
Fortinet’s security fabric – the antidote to complexity
Proofpoint integrates people-centric protection with Okta’s Identity Cloud
Five ways attackers can create havoc in smart homes
Passports, licenses of 300 leaked in Ministry for Culture and Heritage data breach
Cryptocurrency conundrum: Reserve Bank & IR fumble in the dark
Proofpoint and CrowdStrike partner on endpoint protection integration
In the first technology integration, Proofpoint will check potentially malicious attachments with CrowdStrike Falcon Intel and will add new hashes to the customer’s custom intelligence.
OutSystems gains new certifications for cloud security compliance
These certifications demonstrate the level of commitment OutSystems has to ensuring the privacy and protection of its customers’ data in the cloud.
Fileless attacks surge as attackers look to boost ROI
Fileless attacks have skyrocketed 265% this year compared to the first half of 2018, and there’s no sign that they will slow down.
The endpoint management platform with the UX of a smartphone app
Research studies show a 50% cost reduction with this solution compared to traditional Windows management.
VMware's open pledge to help partners and customers make their mark
Technology is neither good nor bad, but it’s often how we shape it. Will technology shape the world we want to live in? Or will it create a world we’re afraid to live in?
Acronis True Image 2020 automates 3-2-1 backups
Acronis True Image 2020 makes it easier for users to keep all of their data, applications, and systems safe.
Businesses ignoring security when investing in new tech
Only a quarter of organisations are prioritising security when it comes to technology investment, according to a new report by Advanced.
Comprehensive security empowering business to innovate faster - Fortinet
Adopting a single-vendor and unified Security Fabric approach carries the least amount of risk as your organisation adopts OT, 5G and DX.
Advanced Security named as NZSA Security Integrator of the Year
The company also won an award for staff retention and development, and one of its staff was recognised as professional of the year in his sector.
Security flaw left Android phones open to SMS phishing attacks found
Check Point Research discovered the vulnerability impacts phones from Samsung, Huawei, LG, and Sony.
Palo Alto Networks expands commitment to NZ market
Palo Alto Networks is expanding its New Zealand business operations in order to better prepare local businesses for growing cybersecurity concerns.
Trustwave platform brings more visibility and control cloud security
The platform aims to give internal security teams deep visibility, technologies and the security expertise necessary for protecting assets and eradicating threats as they arise.
Illusive Networks joins LogRhythm technology alliance partner program
The resulting integration will provide real-time, post-breach threat detection while enhancing and automating incident response.
Ransomware making a comeback, McAfee report finds
McAfee Labs saw an average of 504 new threats per minute in Q1 and a resurgence of ransomware along with changes in campaign execution and code.
Stairway to hell: Scams, ransomware, and $6.5m gone from Kiwis' pockets
In just a three month period this year, New Zealanders reported more than 1000 cybersecurity incidents and financial losses of $6.5 million to CERT NZ.
Blockchain revenues to near US$10B despite 2018 crypto winter
This year blockchain is starting to find its feet as innovators find the use-cases that suit the specific areas in which it can provide value.
The dark side of apps: Security threats on the rise
"Think about it, unsecured Wi-Fi, spoofing, phishing attacks, ransomware, spyware... mobile devices make for the perfect target."
AlgoSec announces new features to improve Cisco ACI automation and application visibility
AlgoSec A30 release delivers new automation capabilities that enable zero-touch security management across SDN, cloud and on-premise networks.
Five winning strategies for VMware in 2019
We look under the hood at the enterprise software vendors plans for the year.
More than half of personal data breaches caused by human error
"The biggest cause of breaches remains the fallibility of people and an inherent inability of employees to send emails to the right person."
Your questions answered: How to make the most of AWS deployments
Amazon Web Services (AWS) is one of the ‘big five’ cloud providers leading the way for millions of enterprises worldwide, but at the end of the day no service is useful if enterprises don’t know how to make the most of it.
F&S: Global first responder C3I spending to near US$100 million
Providing solutions that can make cross-agency sharing and access efficient and effective will augment growth prospects, finds Frost & Sullivan.
Cloud adoption increases ROI, but more expertise needed
Nearly three-quarters of IT decision-makers (71%) believe their organisations have lost revenue due to a lack of cloud expertise.
Carbon Black discovers evolution of popular cryptomining campaign
Attackers could theoretically pull in an estimated $1.6 million annually by leveraging this attack model, which began about two years ago.
Sophos named Magic Quadrant Leader, changes up APAC channel staff
This is the 11th time in a row Sophos has been positioned as Leader and shaken up its APAC and A/NZ channel execs.