Salesforce continues to stumble after critical outage“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
D-Link hooks up with Alexa and Assistant with new smart camera
The new camera is designed for outdoor use within a wireless smart home network.
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
NZ businesses are leaving themselves vulnerable to cyber threats
Barely six per cent of business and companies in New Zealand have adequate cyber protection.
InPhySec forges partnership to tackle NZ cybersecurity market
The Kiwi managed security services provider is partnering with CrowdStrike to bring its endpoint protection solution to its customers.
Infoblox appoints channels head for A/NZ
Kenneth Cartwright’s appointment extends Infoblox’s position in secure cloud-managed network services throughout the region.
How to train staff on security 101
Trained employees are less likely to conduct damaging activities like clicking that dodgy link in an email, or overshare on social media.Download
Symantec, Ixia combine efforts to secure hybrid networks
Ixia’s CloudLens and Symantec Security Analytics now feature complete integration, which allows Symantec customers to gain real-time visibility into their hybrid cloud environments.
Exabeam plans to use $75m fund to leave legacy SIEM vendors in the dust
SIEM provider Exabeam predicts that it will leave legacy providers in the dust, and it’s all down to a US$75 million Series E funding that will be used to ‘displace’ legacy security management vendors.
Silverlake and Intel partner on edge security
With Intel’s software and hardware technologies, Silverlake’s technology stack designed for PAM will form a cybersecurity PAM product line.
Mimecast: Employee training must supplement application security
A company’s biggest security risk is unintentional employee negligence.
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
Forcepoint 2019 APAC Channel Partner Award winners announced
The company recognized 9 partners across 6 categories based on criteria including overall revenue performance and new business growth secured in 2018.
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Involve the players, enjoy the game: Cyber resilience the right way
The most common threats are email-borne, so it makes sense to tackle that one.Download
Red Hat’s new role in enabling modern DevOps
The global open source vendors approach has come of age.
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
Veeam appoints Janet Docherty as A/NZ channel boss
Formerly of Veritas and Symantec, Janet brings 20 years of experience in channel partner engagements.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
Five ways Windows 10 Professional lets you have it all
It’s the definition of a modern desktop that gives you the most productive and secure computing experience.
Leveraging cyber threat intelligence to benefit security posture
One out of five companies are still unsure of CTI’s value to their organisation.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Micro Focus: How to reduce the cost of data security
When new technologies are added to an existing IT process, costs go up, according to Micro Focus.
PrinterLogic software vulnerable to remote attacks
The vulnerabilities affect PrinterLogic versions 22.214.171.124 and older.
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Paranoid Android? Examining three key trends in Android malware
It definitely doesn’t mean you are paranoid if you’re worried about Android security: the threat landscape is growing in every dimension.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.
What your privacy means to Google - and what it's doing about it
Google has declared that it’s all about making privacy work for everyone – despite its long-held reputation as an information harvester.
Microsoft says NZ reasonably cyber secure, but don't get complacent
Cryptocurrency malware is alive and well across the globe – but although New Zealand is one of the countries least at risk of cyber threats, nobody should become complacent.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
Be in to win: Want to control an L-39 Albatros Fighter Jet?
The Aero L-39 Albatros and is a high-performance jet trainer aircraft – and Kordia is giving one lucky winner the opportunity to pilot it.Click Here
SOLD: Infratil & partner snap up Vodafone NZ
Brookfield Asset Management and Infratil will hand over NZ$3.4 billion to acquire Vodafone New Zealand.
Unisys: Users looking for data security when choosing banks
The report studied attitudes of banking customers in Hong Kong, Australia, New Zealand, the Philippines and Taiwan.
Endace enhances analytics with 10GbE deep storage solution
The 8200 Series combines accurate packet capture with deep storage capacity, rapid-search capability and hosting density in a compact 2RU footprint.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
CrowdStrike integrates firmware attack detection in endpoint protection
Most security products remain blind to attacks that attempt to leverage BIOS firmware to infiltrate endpoints, leaving organisations vulnerable to compromise.
Kaspersky Lab signs on Dicker Data for A/NZ
“As the threat landscape continues to evolve and change each day, security has remained a top priority for our partners.” - David Dicker.
Kemp: Three common IoT security pitfalls
Research shows that IoT is disrupting markets and IT organisations worldwide, changing economics and agility in many markets.
Why third-party solutions are key to realising the benefits of Office 365
Research shows ongoing security concerns about email security in Office 365.Download
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
Microsoft achieves FIDO2 certification for authentication solution
FIDO2 is a set of standards that enables easy and secure logins to websites and applications via biometrics, mobile devices and/or FIDO Security Keys.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Whitepaper: Filling your cloud technical skills gap
The study surveys more than 950 IT decision makers and 950 IT pros from across the globe to better understand the barriers to increasing cloud usage.Download
Two years on: Have organisations learnt from WannaCry?
This month marks a special anniversary – two years since one of the world’s most destructive pieces of ransomware ever caused chaos.
BeyondTrust updates remote access solution
Updates in version 19.1 include AWS availability, UI improvements, Mojave support, and more.
Exclusive: Okta CSO on scaling security alongside business growth
Yassir Abousselham shares his unique insights as the chief security officer of a fast-growing identity and access management service provider.
Preventing business email compromise starts on the inside
90% of global organisations have seen phishing attack volumes increase and 40% have seen the volume of impersonation attacks increase.Download
Another cryptocurrency exchange breached, but at least investors are safe
It takes patience to steal more than 7000 Bitcoin (approximately US$41 million) from cryptocurrency exchanges, despite global awareness that such attacks are becoming more prolific.
Whitepaper: Gartner’s top picks for enterprise archiving services
The Magic Quadrant on Enterprise Information Archiving evaluates vendors on compliance, preservation, and discovery use cases.Download
MSSPs for dummies - all you need to know about multicloud security
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. A lot is at stake and yes, you should be cautious.Download
Why businesses are failing at cybersecurity
Email is the number-one vector used to initiate attacks like malware delivery, impersonations and phishing attacks.Download
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
How a virtual CISO can become part of a managed security regime
Security-as-a service is a particularly compelling option for smaller businesses that perhaps do not yet have the resources to adequately maintain a cybersecurity regime internally.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
Whitepaper: Five essential steps to protect your company’s critical data
The increase in devices being used by employees and the number of cloud apps necessitate multiple different channels of accessing a company’s information in a secure manner.Download
D-Link security cams vulnerable to spying
Security researchers at ESET have discovered serious security holes in the D-Link DCS-2132L cloud camera.
It's 'lights out' for two more dark web marketplaces
Don’t be fooled if you see talk that Wall Street Market has been taken down – because it’s most likely not what you think.
Whitepaper: Evaluating VMware Cloud on AWS
VMware Cloud on AWS allows access to the range of AWS services as an extension of an existing VMware solution.Download
Cybera brings remote network operations into clear focus
SD-WAN and security service provider Cybera has released a cloud-based management solution designed to provide deeper insight into remote network operations.
The emotional side of cybersecurity
To train or not to train: This is the emotional side of cybersecurityDownload
One-third of A/NZ business looking to hire security-specific skills - CompTIA
A range of skills is needed to secure modern infrastructure, respond to incoming threats, and ensure proper operations.
How organisations should prepare for cloud migration
How ready are Australian organisations for cloud migration?Download
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Aerohive enables you to manage your network with Alexa
A voice-driven interface to access the network can significantly increase efficiency for IT networking professionals.Click Here
Whitepaper: Neutralise your biggest security risk - your employees
Internal threats caused by careless employees increased by 37% last year, a study has found.Download
Four steps to Zero Trust network security - AlgoSec
The core principles of zero trust reflect the reality of today’s complex, heterogenous enterprise network environments.
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
Whitepaper: Modern information management is a necessity, not a choice
Organisations are facing major challenges that makes information management more challenging than ever before.Download
Chch crypto exchange Cryptopia facing liquidation
It seems that Christchurch-based cryptocurrency exchange Cryptopia has been unable to recover after malicious cyber attackers stole around $20 million worth of cryptocurrency.