Network intelligence is stopping a wave of DDoS misdiagnosis
Security teams already know the value of a layered defence; it’s time to add more layers, writes ThousandEyes principal solutions analyst Mike Hicks.
Rapid response: The best way to detect and respond to traffic anomalies
Mozilla launches first ever VPN, Kiwis amongst first to access
Google unveils security overhaul across G Suite products
Interview: Acronis co-founder on going all-in for DLP
How to increase efficiency in managing security operations
Ultimate security: The best authentication just got better
80% of security breaches involve exposure of customer data - IBM
The new report from IBM indicates that 80% of surveyed organisations reported having exposed customers’ personally identifiable information (PII) as a result of a breach.
Fluid organisations require flexible security
Choice, appropriate risk analysis, and ease of use for everyone top benefits of strong authentication.
Banks, government and health providers 'most trusted' with personal data
Banks, government agencies and healthcare providers, in that order, are trusted the most by Aussies and Kiwis to keep customer personal data safe, according to a report from Genesys.
Fortinet: Security as agile as your network
Jon McGettigan, Fortinet A/NZ Regional Director, explains why your network requires agile security services to fully protect your expanding ‘core and edge’ topology.
Three key driving techniques that apply to the network
Gigamon's CEO on his best practice tips for leveraging network and application data in order to get the visibility levels needed for an organisation's DX journey.
The definitive guide to complete network visibility
Get ready to learn what over 80% of the Fortune 100 can do with Gigamon network visibility and security for your business.
True SASE. True zero trust. True cloud.
Secure Access Service Edge (SASE) is the new way of unifying security. Use the combined power of threat protection and data loss prevention to protect data, users, and systems safe when people are now working from almost anywhere.
Network visibility: Why TAPs reign supreme compared to SPAN ports
TAPs are hardware components that connect into the cabling infrastructure to copy packets for monitoring purposes. So why are they better than SPAN ports?
Juniper Networks inspires overarching approach to connected security
While Juniper is most well-known for its hardware products such as firewalls, routers, switches, and WiFi access points, these are all security products too.
7 VPN services leaked data of 20 million users - report
"The report calls into question the providers’ security practices and dismisses their claims of being no-log VPN services."
DDoS attacks surge 542% amidst COVID-19 pandemic - report
Generally considered the “off season” for DDoS attacks, researchers attribute the surge in incidents to malicious efforts during the COVID-19 pandemic.
Increased demand for cloud computing as organisations look to achieve business continuity - Aruba
The increase in remote working has also created a focus on cyber security for all businesses.
WhiteHawk lands 'milestone' $5.9 million cybersecurity contract
The annual Software as a Service (SaaS) contract is a milestone contract with a Tier 1 client – a key US federal government department.
Acclimation signs reseller partnership with Protect4S
Protect4S is a certified SAP platform security solution that, alongside Acclimation, will deliver SAP security services across Australia and New Zealand.
Chillisoft nabs LogRhythm Distie of the Year for A/NZ
The specialist cybersecurity distributor has made great strides in LogRhythm sales and support since signing with them a year and a half ago.
Fortinet holds position as fastest-growing SD-WAN vendor
According to a new Omida report, the company has seen a 247% revenue growth year-on-year. Plus, Fortinet announces Fortigate 80F.
Security teams face mounting stress, call for execs to step in
“With more organisations operating under remote work conditions, the attack surface has broadened, making security at scale a critical concern. This is a call to action for executives to prioritise alleviating the stress."
Real-world SSL/TLS data from 275 billion network flows
According to Gartner, more than 70% of malware campaigns in 2020 would have used some type of encryption… And 60% of organisations will fail to decrypt HTTPS efficiently.
Forcepoint Dynamic Edge Protection delivers data-centric SASE solutions
The Dynamic Edge Protection suite includes new cloud security gateway and private access offerings through its SASE solution architecture.
Strengthen the weakest link in your security chain
Globalisation. Remote working. High-turnover workforces. These factors and more add up to make increasingly dynamic workforces - and without proper management, your business could fall behind.
16 reasons why you should move your backup to a NZ-hosted solution
It turns out that our own backyard has plenty of advantages over other international locations.
Attivo Networks improves EDN solution with advanced features
“By detecting unauthorised ingress and egress connections both at the source and at the destination, security defenders gain real-time visibility along with conclusive detection alerts.”
Take security awareness training to the next level
Decision makers say leaders are normalising security, but employees say they're wrong.
Global spending on cybersecurity to grow by almost 6%
Even if the global economy worsens and IT budgets suffer, the cybersecurity market will still grow by at least 2.5%, according to a new report by Canalys.
Security spotlight: 15 billion user names and passwords for sale
Security news roundup: What's with all the major cybersecurity breaches?
Microsoft's new security features address common pain points
Azure Sentinel, data loss prevention, and insider risk management are all announcements from this year's Inspire.
Juniper named a Champion in Canalys Leadership Matrix
Champions receive generally positive partner feedback, have a large share of shipments, maintain growth and show improvement in channel management.
A third of millennials think they're 'too boring' to be victim of cyber attack
While many millennials are concerned at how their data is being used and whether they are being targeted by cyber-attackers, according to Kaspersky any potential action taken to tighten their online security is at ‘the bottom of their to-do list’.
Businesses unprepared for bot attacks, despite awareness
Many businesses are aware of the threat of bot attacks, but believe they have the problem under control and are not adequately prepared for the level of risk.
Video surveillance market to reach $44 billion, fuelled by smart cameras and AI - IDC
"Video surveillance camera growth is being driven by the adoption of smart camera systems and the adoption of the video analytics applications that enable them."
Must watch sessions & webinars for IT departments
We look at a bunch of upcoming digital sessions worth attending for CIO's & IT managers.
Adobe, IBM and Red Hat partner up to accelerate DX and real-time data security
"As companies undergo their digital transformations and move core workloads to the cloud, the entire C-suite is facing a re-framing of their roles to meet customer demands – all while keeping security front and centre."
AWS launches fully-managed fraud detection service
Businesses lose billions of dollars to online fraud every year, however businesses respond by investing in cumbersome fraud management solutions that often rely on hand-coded rules and are difficult to keep up to date.
Interview: Forcepoint defines data & user protection for the cloud era
We spoke to Forcepoint’s strategic business director Nick Savvides about data and user protection, and how cloud-managed security can help organisations meet their cybersecurity needs.
Is your head in the sand? Only 60% of firms believe an email could trigger a cyber attack
Where would the world be without the humble email? It's an important tool - and a weapon.
Microsoft business applications support safer workspaces
A pre-built Power Platform solution includes location readiness for safe office reopening, employee health and safety management, workplace care management, and location management.
Gallagher fortifies cybersecurity reporting as NZ's first CVE Numbering Authority
"The CVE Program looks forward to partnering with Gallagher going forward as we collectively maintain our commitment to improving security."
451 Research: The new shape of the enterprise network
In this new world, distance has become the silent digital business killer. Latency looms large, especially for high-performance edge applications, IoT and 5G use cases.
As the most important asset to a business, data must be protected
Data resilience is fast becoming almost as important as data itself. In 2020, businesses need expert insights and analysis to deliver quality data resilience strategies.
Forescout and ServiceNow advance tech partnership to protect critical infrastructure
Forescout and ServiceNow have announced they are advancing their partnership for enhanced operational technology (OT) and industrial IoT capabilities, with an aim of helping organisations to protect critical infrastructure from cyber threats.
How automation can boost business excellence and efficiency
It's possible to improve security, bolster productivity, increase consistency and more, all in one stroke. Here's how IT automation can make your business better.
BT launches first in series of managed security services for Microsoft cloud
“BT’s collaboration with Microsoft is expanding further to recognise the combined strength of our security offerings and deliver industry leading solutions for our customers.”