SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 672

Story image
Atlassian's workplace chat tool 'HipChat' affected by data breach
Tue, 2nd May 2017
#
breach prevention
#
cybersecurity
#
data breach
Workplace group chat tool HipChat has been hit by a data breach and users are being advised to check if they are vulnerable.
Story image
Endace hires new VP Product Management to drive growth of partner program
Tue, 2nd May 2017
#
partner programmes
#
endace
#
channel infrastructure
Cary Wright will be joining the provider of high speed network recording and network history playback with the aim to drive channel growth.
Story image
Multi-product deployments and large deals driving Fortinet growth
Mon, 1st May 2017
#
firewalls
#
network infrastructure
#
network security
Large deals and multiple product deployments have seen Fortinet log continued strong growth, with revenue up 20% in Q1.
Story image
Spoiler alert: Hackers leak unreleased Netflix series
Mon, 1st May 2017
#
digital entertainment
#
cybersecurity
#
netflix
An unidentified hacker has released the highly anticipated Season 5 episodes of popular Netflix show Orange is the New Black.
Story image
Carbon Black: How to set up a threat hunting program
Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.
Story image
Criminals on a mission of ambition and disruption, says Symantec
Mon, 1st May 2017
#
malware
#
ransomware
#
email security
Ransomware attackers are increasing their ransoms; more emails are containing malicious links; and disruption is the word of the day.
Story image
It's not all about the network: How to protect your outbound data
Mon, 1st May 2017
#
brennan it
#
proxies
#
communication
Outbound data oversight a security Achilles' heel, warns IT expert Dayle Wilson, urging businesses to bolster defences.
Story image
TrickBot malware ramps up attacks against ANZ financial firms
Mon, 1st May 2017
#
malware
#
cybersecurity
#
ibm security
Attackers behind the TrickBot Trojan have been taking their tactics to the next level, researchers from IBM X-Force have uncovered.
Story image
Harness your inner mobility with mobile tech that makes a difference
Mon, 1st May 2017
#
lenovo
#
mobility
#
thinkpad
Lenovo's ThinkPad X1 series empowers remote and on-location workers with high performance and security. Discover more in Lenovo's new e-book.
Story image
When innocent mistakes turn into costly problems
Mon, 1st May 2017
#
endpoint protection
#
edr
#
hackers
70% of firms faced pricey security breaches due to compromised accounts, careless misuse, or malicious insiders—only 1% were unscathed.
Story image
Cybercriminals use verified API token to generate Facebook spam comments
Fri, 28th Apr 2017
#
api
#
cybersecurity
#
facebook
In exchange for more ‘likes’ and comments on their own timelines, users are enticed to provide the app’s access token to a third-party website.
Story image
From raw data to actionable intelligence: The art and science of endpoint security
Fri, 28th Apr 2017
#
ai security
#
ai
#
microsoft
The endpoint is vulnerable. That’s where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.
Story image
NEC releases facial recognition software - passwords, a thing of the past?
Thu, 27th Apr 2017
#
digital signage
#
surveillance
#
biometrics
NEC's new facial recognition software could make traditional passwords obsolete, boosting security for mobile services.
Story image
Young cybercriminals ‘more motivated by peer respect than financial gain’
Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Story image
Equinix: Localise and optimise traffic at the digital edge
Thu, 27th Apr 2017
#
hyperscale
#
dc
#
cybersecurity
The digital edge - This is the place where information is exchanged, transactions are conducted, and data is gathered and analysed.
Story image
Carbon Black asks: So what exactly is threat hunting?
Wed, 26th Apr 2017
#
malware
#
cybersecurity
#
threat intelligence
​Information security professionals used to put all of their chips towards incident prevention. This didn’t work out very well.
Story image
Exclusive: NSP taking LogRhythm SIEM to SMB market with security-as-a-service offering
Wed, 26th Apr 2017
#
siem
#
exclusive networks
#
logrhythm
Network and system integrator NSP is gearing up to launch a new security-as-a-service offering, which takes LogRhythm's SIEM to the SMB market.
Story image
Big data and machine learning make compelling argument for security
Wed, 26th Apr 2017
#
data analytics
#
martech
#
planning
Big data and machine learning help organisations identify security breaches, according to a report by the Ponemon Institute.
Story image
NGFW market booms on back of advanced and dynamic threats
Mon, 24th Apr 2017
#
analyst report
#
threat landscape
#
integrated security
Next gen firewalls with integrated security offerings are seeing mass adoption and offering strong growth opportunities according to Frost & Sullivan.
Story image
Verizon's Threat Research Advisory Center a 'significant milestone' for intelligence
Mon, 24th Apr 2017
#
breach prevention
#
ai security
#
cybersecurity
Verizon’s Threat Research Advisory Center is now live and operational - representing what it calls a ‘significant milestone’ into cybersecurity.