SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 681

Story image
Is your IT team experiencing alarm fatigue? Create a rapid response to cyber threats
Mon, 27th Feb 2017
#
siem
#
breach prevention
#
logrhythm
IT teams are experiencing 'alarm fatigue' and they are lagging behind. Here's how you can transform your teams to achieve rapid response.
Story image
Weekly NZ security roundup: 31c0n, cyber threats, Darknet and Mimecast
Fri, 24th Feb 2017
#
malware
#
firewalls
#
network infrastructure
NZ's cybersecurity scene is abuzz with 31c0n insights, stark cyber risks, Darknet exposés, and Mimecast's email defence revelations.
Story image
Suprema ups biometric sensor game to provide ‘world’s fastest matching speed’
Thu, 23rd Feb 2017
#
biometrics
#
fingerprint scanners
Biometrics firm Suprema has launched BioSign 2.0, a mobile fingerprint authentication technology with unparalleled speed and accuracy.
Story image
NZ’s premier security conference 31c0n probes unanswered questions in two-day event
Thu, 23rd Feb 2017
#
cybersecurity
#
aura information security
#
partners
An intimate and devoted group of 160 security professionals have descended on the Viaduct Events Centre today as part of 31c0n.
Story image
The cyber threats you’ll face in 2017 - and tips for defending against them
Thu, 23rd Feb 2017
#
ai security
#
ai
#
cybersecurity
Experts warn against polymorphic malware in 2017, with Webroot's latest report offering defence strategies for emerging cyber threats.
Story image
User behaviour may be the hidden secret to security, says Forcepoint
Wed, 22nd Feb 2017
#
data analytics
#
martech
#
planning
80% of cybersecurity professionals believe it’s important to understand people’s behaviours when it comes to intellectual property & critical data.
Story image
Dangerous Android Trojan masquerades as Flash Player update
Wed, 22nd Feb 2017
#
smartphones
#
malware
#
cybersecurity
A new Android Trojan has been lurking under a fake app that tries to mimic a Flash Player update, ESET discovered this week.
Story image
CyberArk expands partner program in privileged account security push
Tue, 21st Feb 2017
#
healthtech
#
cyberark
#
partners
CyberArk has ramped up its partner program in an effort to enhance its partners' privileged account security expertise and drive new business.
Story image
Check Point joins Cyber Threat Alliance alongside global security heavyweights
Tue, 21st Feb 2017
#
advanced persistent threat protection
#
cyber threats
#
cyber threat alliance
Check Point is the sixth member in the global Cyber Threat Alliance (CTA), alongside Cisco, Fortinet, Intel Security, Palo Alto Networks and Symantec.
Story image
Welivesecurity reveals the eight things you should know about spyware
Tue, 21st Feb 2017
#
malware
#
cybersecurity
#
spyware
Spyware is widely spread across the web, and is ever present on today’s mobile and desktop devices. You should be security-conscious at all times.
Story image
CompTIA zeroes in on behavioural analytics with new global security certification
Tue, 21st Feb 2017
#
data analytics
#
martech
#
planning
CompTIA introduces CSA+ certification, pioneering behavioural analytics in global IT security to tackle advanced cyber threats.
Story image
Centrify harnesses machine learning for user access protection
Mon, 20th Feb 2017
#
pam
#
centrify
#
analyst report
Centrify has today launched its new analytics service to the ANZ region, which provides another solution to stop breaches in real time.
Story image
NZ directors believe cyber risk tops the threat list for 2017
Mon, 20th Feb 2017
#
risk & compliance
#
risk management
Cyber attacks are predicted to be the biggest threat to New Zealand this year, according to a survey by Marsh.
Story image
ESET receives three AAA ratings in anti-malware protection tests
Mon, 20th Feb 2017
#
malware
#
cybersecurity
#
se labs
ESET has walked away with three of what it calls the ‘highest accolades’ in the SE Labs Anti-Malware Protection Tests.
Story image
Phishers bypass content blockers and target Apple users in latest attacks
Mon, 20th Feb 2017
#
phishing
#
email security
#
personal computing devices
A simple replica login page is fooling Apple users into falling for a phishing attack - and it's using font substitution to bypass content blockers.
Story image
In depth: Mimecast talks email security, insider threats and human firewalls
Mon, 20th Feb 2017
#
malware
#
cybersecurity
#
email
Email security breaches continue to occur due to evolving threats and a lack of next generation security solutions, according to Mimecast's Dave Hood.
Story image
Penetration testing: How you can manage it the easy way
Mon, 20th Feb 2017
#
cybersecurity
#
lateral security
#
automotive
Why should I get a Penetration test? The simple answer is to provide assurance that your IT infrastructure isn’t vulnerable.
Story image
Traditional security is dead: It's time to think of the next generation
Mon, 20th Feb 2017
#
endpoint protection
#
ai security
#
edr
Security spend is rising, but so are the number of data breaches. Something isn’t working. It's time to think next-generation endpoint security.
Story image
Opportunistic cyber attacks most dangerous, says SecureWorks report
Fri, 17th Feb 2017
#
malware
#
ransomware
#
advanced persistent threat protection
SecureWorks' new report reveals a way for organizations to fight opportunistic cyber attacks and highlights pitfalls in the security industry.
Story image
Exploring the cybercrime underground: Darknet markets - where cyber criminals trade
Fri, 17th Feb 2017
#
firewalls
#
network infrastructure
#
network security
This blog focuses on explaining what darknet markets are, common payment model used, the type of digital data being bought and sold, and their costs.