Latest news - Page 743

Mobile security company signs inTechnology as distie
Wed, 1st Jul 2015
#
firewalls
#
network security
#
breach prevention
Juniper Networks' off-shoot Pulse Secure signs inTechnology as local distie, aiming to address 'challenging' mobile and access security issues in ANZ.

Cisco acquires security company for $635mn, builds IoT offering
Wed, 1st Jul 2015
#
uc
#
cybersecurity
#
cisco
Cisco has announced its acquisition of security firm OpenDNS for USD $635 million to enhance its IoT offerings, set to close in fiscal Q1 2016.

Salient Eye app catches Kapiti Coast thief
Wed, 1st Jul 2015
#
smartphones
#
breach prevention
#
cybersecurity
Salient Eye, a free Android home security app, has helped a family in Wellington catch an intruder trying to break into their home.

CipherCloud heads up cloud security open working group
Tue, 30th Jun 2015
#
cloud security
#
casb
#
deloitte
CipherCloud leads a group heralding the standardization of cloud data protection, boosting secure cloud adoption rates.

Technology: Just one part of the security problem
Tue, 30th Jun 2015
#
breach prevention
#
cybersecurity
#
personal computing devices
Companies face security risks beyond just technology, says industry association CompTIA. Lack of security policies and human error are key vulnerabilities.

Cisco aims to dominate digitisation with new IoT System
Tue, 30th Jun 2015
#
smart cities
#
iot
#
cisco
Cisco has released a new Cisco IoT System and 15 new IoT products to capitalise on the opportunities presented by the current wave of digitisation.

Shavlik releases security software in Microsoft Azure Marketplace
Mon, 29th Jun 2015
#
public cloud
#
cybersecurity
#
microsoft
Shavlik Protect now available on Microsoft Azure, allowing users to install patch management in under one minute.

Kiwis have little faith in NZ businesses when it comes to cyber attacks
Thu, 25th Jun 2015
#
smb
#
sme
Three out of four people think New Zealand businesses are not well prepared to manage computer hacking and keep data secure and confidential.

Time nearly up for Microsoft end-of-support
Wed, 24th Jun 2015
#
risk & compliance
#
microsoft
#
windows server 2003
Microsoft NZ urges prompt migration from Windows Server 2003 as end-of-support looms, posing significant cyber risk.

ESET on the Samsung Galaxy exploit
Tue, 23rd Jun 2015
#
malware
#
cybersecurity
#
samsung
Because Samsung phones grant elevated privileges to update code, a payload delivered in this way bypasses many of the Android system protections.

BYOD security: Protect your data before it's too late
Tue, 23rd Jun 2015
#
smartphones
#
dr
#
cybersecurity
BYOD data protection policy is crucial as mobile devices are targeted by criminals, says Acronis. 38% of companies to rely on BYOD by 2016.

Financial organisations increasingly vulnerable to cyber attacks
Tue, 23rd Jun 2015
#
risk & compliance
#
cybersecurity
#
bae systems
UK banks at higher cyber threat, lags in safeguarding against sophisticated financial crimes, says BAE expert.

Enterprise container adoption on the rise
Mon, 22nd Jun 2015
#
devops
#
apm
#
open source
Container adoption is likely to surge in the next few years, while concerns around security, certification and adequate skills linger.

Major security flaw in Samsung Galaxy devices
Mon, 22nd Jun 2015
#
smartphones
#
samsung
#
samsung galaxy
Samsung says the flaw is extremely difficult to exploit, but if successful, an attacker could have an enormous amount of access to an affected device.

60% of cyber-attacks target SMEs
Mon, 22nd Jun 2015
#
cybersecurity
#
smb
#
connect smart week
This year’s Connect Smart Week is a reminder for SMEs to be vigilant about online security, says Amy Adams, Communications Minister.

8 ways to stay safer when shopping online
Mon, 22nd Jun 2015
#
data protection
#
martech
#
commerce systems
With Connect Smart Week launching today, MasterCard is encouraging Kiwis to protect themselves when shopping online.

Cybercrims bypassing two-factor authentication with simple txt
Thu, 18th Jun 2015
#
mfa
#
cybersecurity
#
symantec
Strong passwords and two-factor authentication are no match for simple social engineering, with Symantec warning of a new password recovery scam.

Landesk looks at employee satisfaction and BYOD
Wed, 17th Jun 2015
#
personal computing devices
#
byod
#
productivity
The majority of employees are satisfied with their IT departments, and BYOD is aiding productivity but is still a security gap, says Landesk.

Five steps to an effective recovery plan
Tue, 16th Jun 2015
#
dr
#
hyperscale
#
cloud services
It is critical to have a comprehensive disaster recover plan to prevent downtime and facilitate faster recovery from interruptions, says CenturyLink.

Blue Coat named a Magic Quadrant Leader yet again
Tue, 16th Jun 2015
#
gartner magic quadrant
#
analyst report
#
ss&c blue prism
In order to select ‘leaders’, Gartner evaluates vendors on their ability to execute as well as the completeness of vision of their products in the SWG.