SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 572

Story image
Dell EMC expands multicloud data protection capabilities
Thu, 7th Feb 2019
#
data protection
#
network infrastructure
#
multi-cloud
According to IDC, 92% of organisations have adopted a cloud environment with 64% adopting a multi-cloud approach.
Story image
CrowdStrike opens endpoint protection platform to third-party apps
Thu, 7th Feb 2019
#
saas
#
uc
#
endpoint protection
The CrowdStrike Store leverages the cloud for both scale and telemetry, enabling applications to deliver faster, smarter, and more effective solutions.
Story image
Ziften extends proprietary AI/ML security across all endpoints
Thu, 7th Feb 2019
#
endpoint protection
#
edr
#
ai
Ziften deploys advanced proprietary AI and ML to enhance security across all endpoints, offering robust protection for Windows, macOS, and Linux systems.
Story image
Honeywell upgrades USB protection for ICS environments
Thu, 7th Feb 2019
#
honeywell
#
usb
#
industrial control systems
Industrial cybersecurity provider Honeywell has doubled down on its protection against USB-based threats towards industrial operators.
Story image
Migration away from on-prem data centres stalled by security
Thu, 7th Feb 2019
#
storage
#
hybrid cloud
#
hyperscale
Despite the surging cloud adoption that is rife around the world, a new study has revealed there’s still a lack of understanding around security.
Story image
Cybercrime tools and services becoming increasingly democratised
Thu, 7th Feb 2019
#
ddos
#
cybersecurity
#
cybercrime
Findings from Check Point's new report reveal a concerning trend as cybercrime grows increasingly well-managed and accessible.
Story image
Palo Alto changes up partner programme
Wed, 6th Feb 2019
#
firewalls
#
network infrastructure
#
network security
The changes include a dedicated programme for managed services providers and a raft of new processes and initiatives.
Story image
Personalisation more important than privacy for Gen Z
Wed, 6th Feb 2019
#
data protection
#
cybersecurity
#
online safety
Gen Z doesn’t just use the internet to connect them, entertain them, sell to them, and build their digital brand, they expect it to.
Story image
Interview: Inside the crybercriminal gig economy for bots
Tue, 5th Feb 2019
#
akamai
#
bots
#
gig economy
TechDay spoke to Akamai Asia Pacific security technology and strategy head Fernando Serto about how organisations are being impacted.
Story image
Extreme Networks launches IoT security solution
Tue, 5th Feb 2019
#
firewalls
#
network infrastructure
#
network security
IoT devices are typically deployed in a flat or unsegmented network so that if breached, the attacker can gain access to sensitive areas of the network.
Story image
Interview: Tenable CTO on how companies should measure cyber risk
Tue, 5th Feb 2019
#
tenable network security
#
nation state attacks
#
fia
Rising geopolitical tensions coupled with an expanding attack surface have left governments and organisations vulnerable to targeted attacks.
Story image
Compliance requirements driving better data management - 451 Research
Tue, 5th Feb 2019
#
devops
#
data analytics
#
digital transformation
90% of respondents in a 451 Research report say they will significantly increase investment in DataOps technologies this year.
Story image
Death by cryptocurrency: Could $190m be lost forever?
Tue, 5th Feb 2019
#
blockchain
#
email security
#
cybersecurity
Exit scam, or just plain bad luck? Investors in one of Canada’s largest cryptocurrency exchanges will be pondering that very question.
Story image
Flashpoint: Contextual data key to effective security
Mon, 4th Feb 2019
#
data analytics
#
martech
#
planning
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.
Story image
Dell partners with Secureworks and CrowdStrike on endpoint security offering
Mon, 4th Feb 2019
#
network infrastructure
#
endpoint protection
#
partner programmes
Dell’s approach is designed to prevent, detect and respond to the shifting threat landscape, and makes it easy for organisations to protect their data.
Story image
Expert comment: What the Collection #2-5 data dump means for credential abuse
Mon, 4th Feb 2019
#
mfa
#
phishing
#
email security
TechDay spoke to experts and executives in the security industry about the data leak and the implications on phishing and credential stuffing.
Story image
DigiCert Labs to research postquantum cryptography & ML
Mon, 4th Feb 2019
#
encryption
#
certification
#
digicert
The new research lab will collaborate with university researchers and industry leaders on ways to develop innovative approaches to security challenges.
Story image
IT security teams suffering an 'image problem'
Mon, 4th Feb 2019
#
cybersecurity
#
it budget
#
thycotic
Security professionals feel like they are perceived as ‘policemen’, and 13% say they experience negativity from colleagues all the time.
Story image
Expert asserts BaaS ‘critical for data centre security’
Mon, 4th Feb 2019
#
dr
#
hyperscale
#
blockchain
In an IT world clogged with acronyms, Comport says there is one that many data centres are failing to properly implement.
Story image
Achieving uncompromising security without compromising privacy
Fri, 1st Feb 2019
#
endpoint protection
#
casb
#
edr
Navigating the BYOD era, companies must balance robust security measures with user privacy, steering away from invasive MDM to agentless solutions.