SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 704

Story image
Careful with your fingers: Hackers can steal everything you type
Fri, 5th Aug 2016
#
cybersecurity
#
keyboard
#
extend
Earlier this year, security firm Bastille found that millions of cheap keyboard and mouse dongles let hackers inject keystrokes onto your machine.
Story image
Cyber security market set for a revenue revival
Thu, 4th Aug 2016
#
cybersecurity
#
tbr
#
enterprise security
The cyber security market is set for a revival as new vendors take top positions in market share, according to a report by TBR.
Story image
Firefighting, security and compliance - are they separate issues?
Thu, 4th Aug 2016
#
cybersecurity
#
cloud services
#
firefighting
Sometimes a critical issue like a virus outbreak or a major systems malfunction, sometimes something as urgent as a VSIP.
Story image
Illumio creates MRI-like scan for the data center
Thu, 4th Aug 2016
#
hyperscale
#
dc
#
cybersecurity
The Illumio Attack Surface Assessment Program (ASAP) has been created to give enterprises MRI-like visibility inside the data center and cloud.
Story image
Arbor takes out top Asia-Pacific anti-DDoS solution award
Wed, 3rd Aug 2016
#
ddos
#
arbor networks
#
analyst report
Holistic approach to DDoS protection, country-specific threat intelligence and continuous innovation see Arbor take out on-prem DDoS solution award.
Story image
Intel corp appoints Paula Tolliver as new CIO
Wed, 3rd Aug 2016
#
cybersecurity
#
intel
#
cio
Paula Tolliver replaces Kim Stevenson as CIO at Intel, bringing her expertise in cybersecurity and strategic acumen to the role.
Story image
Endace demonstrates benefits of network-wide monitoring
Wed, 3rd Aug 2016
#
hybrid & remote work
#
endace
#
wfh
EndaceProbe 114 revolutionises branch office security, giving SOCs network-wide visibility and speeding up breach investigations.
Story image
Symantec delves deeper into its CCS suite
Wed, 3rd Aug 2016
#
cybersecurity
#
symantec
#
ccs
Symantec releases Control Compliance Suite, offering new features for agile IT governance and compliance in cybersecurity.
Story image
Tips for securing wireless networks in the IoT era
Wed, 3rd Aug 2016
#
iot security
#
iot
#
wireless networks
​Look up digital disruption in the dictionary and it’s likely you’ll see the Internet of Things (IoT) sitting there proudly as an example.
Story image
RSA celebrates success of APAC security conference
Wed, 3rd Aug 2016
#
cybersecurity
#
rsa security
RSA's cybersecurity conference in APAC hailed a triumph, setting a stage for advances in digital security amidst Smart City aspirations.
Story image
InternetNZ launches business transparency tools to report mass surveillance
Wed, 3rd Aug 2016
#
surveillance
#
data privacy
#
internetnz
It might just become easier for Kiwis to see if 'mass surveillance' is happening as InternetNZ launches transparency report tools for businesses.
Story image
Cisco report reveals ransomware attacks on the rise: Expert commentary
Wed, 3rd Aug 2016
#
malware
#
ransomware
#
ai security
There have been some startling findings – organisations are unprepared for future strains of more sophisticated ransomware. Here's some advice.
Story image
KnowBe4 makes security training solution available in 26 languages
Wed, 3rd Aug 2016
#
malware
#
ransomware
#
it training
The interactive, on-demand and computer-based training covers high-risk topics and how you can identify red flags in your system.
Story image
Blue Coat enhances its security analytics tool kit
Tue, 2nd Aug 2016
#
soc
#
blue coat
#
security analytics
Blue Coat enhances Security Analytics with anomaly detection and support for SCADA environments to improve incident response.
Story image
Kaspersky Labs offers $50,000 'bug bounty' to security researchers
Tue, 2nd Aug 2016
#
hackers
#
kaspersky
#
security vulnerabilities
Security researchers Kaspersky Lab & bug bounty platform Hacker One are co-launching a Bug Bounty Program that offers $50,000 to security researchers.
Story image
Trend Micro helps INTERPOL bring down notorious Nigerian cybercriminal
Tue, 2nd Aug 2016
#
cybersecurity
#
trend micro
#
bec scam
Trend Micro has helped INTERPOL catch the leader of a Nigerian cyber criminal ring, responsible for up to $60 million in losses from BEC scams.
Story image
Heard of Jackware? When connected cars meet ransomware
Tue, 2nd Aug 2016
#
malware
#
ransomware
#
cartech
I define jackware as malicious software that seeks to take control of a device, the purpose of which is not data processing or digital communications.
Story image
Could passwords be past their use-by date?
Tue, 2nd Aug 2016
#
cybersecurity
#
centrify
#
saml
Over-reliance on passwords is putting companies' IT security at risk, according to Lachlan McKenzie, ANZ manager for Centrify.
Story image
PowerWare ransomware imitates locky malware family
Mon, 1st Aug 2016
#
malware
#
firewalls
#
network infrastructure
PoshCoder has been encrypting files with PowerShell since 2014, and the new variant named PowerWare was reported in March 2016.
Story image
A warning from Zscaler - don't drop your security baton this olympics
Mon, 1st Aug 2016
#
cybersecurity
#
olympic games
#
zscaler
With the Olympics on the horizon, a strong warning has been issued for organizations by Zscaler to refocus their security efforts.