Sungard AS named DRaaS leader by ForresterIt was noted for its disaster-recovery-as-a-service solution’s ability to “serve client needs at all stages of their need for business continuity.”
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
emt Distribution adds risk intelligence vendor
Flashpoint has signed emt Distribution to provide channel partners in Oceania and South East Asia a solution for illicit threat actor communities.
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Information is power: The basics of security awareness training
Where do you even start with security awareness training? What should you teach, and to whom?Download
Streaming services prime targets for credential stuffing attacks
Video and streaming services are prime targets for cyber attackers who attempt to conduct credential stuffing attacks, according to new research from Akamai.
Whitepaper: Gartner’s top picks for enterprise archiving services
The Magic Quadrant on Enterprise Information Archiving evaluates vendors on compliance, preservation, and discovery use cases.Download
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.Download
Whitepaper: Neutralise your biggest security risk - your employees
Internal threats caused by careless employees increased by 37% last year, a study has found.Download
US students hack school WiFi network
Two high school students in the United States were arrested for allegedly hacking their school’s WiFi network to avoid taking a test, proving that education institutions still have work to do when it comes to securing their networks.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Whitepaper: Five essential steps to protect your company’s critical data
The increase in devices being used by employees and the number of cloud apps necessitate multiple different channels of accessing a company’s information in a secure manner.Download
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.Download
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Employees behaving badly? It’s your choice
What your employees do and how they behave when you’re not looking over their collective shoulder is entirely up to you.Download
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
Whitepaper: Modern information management is a necessity, not a choice
Organisations are facing major challenges that makes information management more challenging than ever before.Download
Fortinet drives security-based networking with new SD-WAN offerings
At Fortinet Accelerate 2019 in Orlando, the company unveiled its SD-WAN solutions, including what it calls the industry’s first SD-WAN ASIC.
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.Download
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
GCSB outlines cyber resilience tips for NZ businesses
Governance, investment, readiness, and supply chain: The four key areas for good practice in cybersecurity, according to the GCSB.
Preventing business email compromise starts on the inside
90% of global organisations have seen phishing attack volumes increase and 40% have seen the volume of impersonation attacks increase.Download
Survey shows organisations in the dark about shadow mining threat
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
Risky business: Avoid putting all your eggs in one basket
Many businesses that transition to the cloud blindly rely on a single cloud service provider for day-to-day security.
Combat converged IT and OT security risks - Forescout
At specific risk are healthcare organisations, manufacturers, energy providers, and any business where building management technology is part of the IT network.
$33 million lost to scams & fraud: Netsafe says NZ isn't doing enough to stop it
" This is an issue that isn’t going away. More needs to be done or we will continue to see large numbers of New Zealanders suffering financial and psychological harm,” says Netsafe CEO Martin Cocker.
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.Download
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.Download
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
WatchGuard takes to the cloud with new platform
The platform delivers multi-tier and -tenant capabilities, scaling automatically to allow MSPs to create and manage unlimited customer accounts.
Thales completes 15-month Gemalto acquisition
The combination creates a portfolio of digital identity and security solutions based on technologies such as biometry, data protection, and, more broadly, cybersecurity.
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
Honeywell launches online enterprise app store
The Honeywell Marketplace provides direct access to enterprise mobile apps, enabling software vendors to directly engage customers and collaborate with other developers.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Okta launches risk-based authentication with machine learning
The new feature will allow enterprises to automate security by implementing significantly stronger authentication techniques and remediation when the scenario calls for it.
How organisations should prepare for cloud migration
How ready are Australian organisations for cloud migration?Download
Security ‘not their problem’? Set them straight on cyber resilience for email
“It’s not my problem” – how often have you heard that excuse from teams outside IT security? Ideally it’s becoming less common, but there’s still an ostrich mentality within organisations.Download
Awareness but no action – AU firms exposed to security, compliance threats
Security managers know the many ins-and-outs of security best practices and employees’ everyday behaviour, but few are doing anything to fix security issues.Download
Fuji Xerox NZ unveils two new feature-packed printer series
This month Fuji Xerox New Zealand announced two new series additions to its portfolio of monochrome printers ideal for the modern office.
Experts and execs comment on Facebook data leak
“Tech companies are the custodians of user credentials and other personally identifiable information, a valuable resource in today's world.”
Why businesses are failing at cybersecurity
Email is the number-one vector used to initiate attacks like malware delivery, impersonations and phishing attacks.Download
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.
Aura Infosec discovers major Mozilla Firefox vulnerability
Alex Nikolova made the discovery while conducting a research project on the same-origin policy of various web browsers.
Fortinet's bid to close the cyber skills gap
A comprehensive training and education strategy must include strategic partnerships within government, academia and NGOs.
Interview: Uber's CISO reveals lessons learned from breaches
Uber’s chief information security officer John ‘Four’ Flynn has a career history that many technologists could only dream of.
Network security in A/NZ - OVH
Ensuring operations can be performed at a continuous fast pace will be vital for businesses in 2019.
Okta announces security layer for on-prem apps
For many organisations, the present and the future will be hybrid, with mission-critical applications residing both on-premises and across multi-cloud environments.
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
Yahoo proposes US$117.5m breach settlement - but will it be enough?
Judge Lucy Koh must decide if Yahoo's previous dodgy settlement tactics are forgiven in this latest proposal.
Trend Micro announces security products for Google Cloud Platform, Kubernetes and Gmail
“It is critical for enterprises to remember that they share in the responsibility of what they put in the cloud.”
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
AlgoSec launches security and compliance management for multicloud
CloudFlow’s centralised management gives organisations visibility, risk and compliance analysis, and automated detection of misconfigurations.
Network security providers dominate cybersecurity - Canalys
Cisco, Palo Alto Networks and Fortinet, all with a strong focus on network security products, outperformed the market, recording strong double-digit growth.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
Flashpoint global channel strategy seeing dividends
The company’s channel-driven revenue has also grown more than 200% since it signed its first partner in 2015.
Whitepaper: Filling your cloud technical skills gap
The study surveys more than 950 IT decision makers and 950 IT pros from across the globe to better understand the barriers to increasing cloud usage.Download
85% of organisations struggling with access management – Thycotic
More than 50% of the organisations surveyed said privileged accounts never expire or get deprovisioned.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Millions of Facebook user records exposed in latest data leak
UpGuard reported that each of the data sets was stored in its own Amazon S3 bucket configured to allow public download of files.
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Okta launches $50mil fund to fuel identity solutions startups
The fund will seek out startups that are aligned with Okta's vision of enabling any organisation to use any technology.
Eaton brings the world’s first UL certified UPS network card to A/NZ
The launch marks the expansion of Eaton’s cybersecurity program and collaboration with global safety science organisation UL.
Five ways to strengthen email security - Barracuda
Organisations need a defence posture that is able to detect and prevent attacks before they cause harm.
Why multifunction devices need biometric security
PINs, or ID badges on card readers are important basic measures, but can still leave information vulnerable in the case that they’re lost, stolen, or copied.
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.Download
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Bromium uncovers major malware distribution centre
Over a dozen US-based web servers from far-right linked hosting service are being used to target businesses with mass phishing campaigns spreading malware.
WikiLeaks' Julian Assange arrested in London
There’s little doubt that it’s a day of reckoning for WikiLeaks cofounder Julian Assange today, after his seven-year long protection inside London’s Ecquador Embassy came to an abrupt end.
MSSPs for dummies - all you need to know about multicloud security
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. A lot is at stake and yes, you should be cautious.Download
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.Download
Why third-party solutions are key to realising the benefits of Office 365
Research shows ongoing security concerns about email security in Office 365.Download
Aruba announces new automated IoT security solutions
When addressing their IoT strategies, organisations globally are faced with new security and connectivity challenges.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download