Security
Brief
New Zealand
New Zealand's leading source of cybersecurity and threat news
Login
Register
Search
More stories:
11 Nov
Bitglass report finds 66% of companies omit key security tool
The report found that only 34% of companies are authenticating users accessing cloud data via SSO.
More
11 Nov
Inland Revenue cracks down on multinationals' tax obligations
“If they don’t play by the new rules, we will know who they are, and they should expect we’ll be in touch."
More
08 Nov
Enterprises look to zero trust network access to thwart VPN attacks
“Though it is encouraging to see so many organisations are pursuing ZTNA to close gaps created by VPNs, I am surprised that more than half of those surveyed believe their current infrastructure is reliable enough to protect the enterprise."
More
08 Nov
Kordia hires its first full-time CISO, Hilary Walton
She is a former 2012 Olympics security manager, and she has worked with British intelligence agency MI5.
More
07 Nov
Worldwide spending on security products and services set to reach $151.2 billion in 2023
"Considering there have been many attempts for hackers to acquire funds from banks, the banking industry is expected to spend the most on security solutions."
More
07 Nov
Alibaba Cloud gains new security accreditations
Alibaba Cloud obtained the Level 3 assessment in TISAX for automotive and Good “x” Practice (GxP) readiness assessment for the healthcare industry.
More
06 Nov
Barracuda Networks integrates WAF into cloud platform
Barracuda Networks announced a new Cloud Application Platform (CAP), which provides security, as well as a new web application firewall (WAF) as a service solution built on Microsoft Azure.
More
05 Nov
Microsoft's new security innovations at Ignite 2019
Microsoft 365 and Security corporate vice president Kirk Koenigsbauer outlined 10 major security announcements across Azure, Microsoft 365, Office, and Microsoft Defender ATP.
More
05 Nov
Adobe, New York Times and Twitter announce content authenticity initiative
Adobe is developing an opt-in system that will allow creators and publishers to securely attach attribution data to content they choose to share.
More
05 Nov
Proofpoint acquires insider threat management firm ObserveIT
Proofpoint will hand over US$225 million as part of a new arrangement to acquire insider threat management platform ObserveIT.
More
04 Nov
How to protect Industrial IoT from ransomware
Ransomware outbreaks in 2017 hit production networks worldwide, resulting in shutdowns, massive clean-up efforts and millions of dollars in damages, Claroty finds.
More
04 Nov
WatchGuard inks distie agreement with Soft Solutions
Soft Solutions will distribute the company’s entire range of network security, W-Fi and multifactor authentication products.
More
04 Nov
Fortinet buys out enSilo to bolster endpoint security portfolio
Fortinet has acquired a US-based endpoint security company enSilo as the company continues to flesh out its global security solutions.
More
01 Nov
Breaches on the rise despite increased security spend, survey finds
"This study shows the vulnerability gap that has been a growing pain point for CIOs and CISOs."
More
31 Oct
Safeguarding against AI-based cyber-attacks
Fraudsters using AI to mimic voices is just an evolution in technology, says Wontok.
More
31 Oct
Qrious attains ISO 27001 data security certification
“This is a commitment to a yearly review process requiring evidence that Qrious has continuously raised the bar on data security practices.”
More
31 Oct
ConnectWise acquires Continuum and ITBoost
Together, these moves aim to put more problem-solving resources, tools for efficiency, and fuel for growth in the hands of partners.
More
31 Oct
How SMS became the trusted mode of customer communications
About 90 percent of text messages are read within three minutes of receipt and we’re seven times more likely to respond to a text than an email.
More
31 Oct
F5 integrates BIG-IQ into Venafi Machine Identity Protection Platform
The integration allows network operations to orchestrate the lifecycle of SSL/TLS certificates and ensure security policies are enforced across devices.
More
30 Oct
Women underrepresented in cybersecurity in half of enterprises - Kaspersky
Despite some diversity initiatives, women constitute 39% of the labour force and only 25% of management positions worldwide in general.
More
30 Oct
Digital optimisation makes HR processes easier - Hyland
Although we tend to think of data breaches as the work of malicious hackers, carelessness and mishandling of sensitive documents are just as likely to be the culprit.
More
29 Oct
Securing the unknown with visibility and control
What’s getting in the way of an organisation’s security health and what needs to happen to secure those vulnerabilities? What assets does an organisation own? How does an organisation gain visibility? Where do the assets live? Who has access to those assets?
More
26 Oct
Securing IoT top priority for enterprises, research says
Developing and managing secure IoT deployments is no longer the remit of security professionals but is a capability that is quickly becoming available to developers of all levels."
More
25 Oct
The cost of securing BYOD with mobile agents - Bitglass
A security solution like mobile device management (MDM) fails to respect user privacy and should not be a common security practice.
More
24 Oct
The human eye as a proxy for the future of networking
In recent years scientists have been unravelling the intricate structure and wiring of retina neurons within the eye - Mellanox Technologies looks beneath the surface.
More
24 Oct
Rackspace selects Armor to deliver security for hybrid cloud environments
Armor’s cloud security platform, Armor Anywhere, will be integrated into Rackspace’s portfolio of security services for all major private and hyperscale public clouds.
More
24 Oct
Attacks on IoT devices booming, research finds
“As people become more and more surrounded by smart devices, we are witnessing how IoT attacks are intensifying."
More
24 Oct
The dawn of a new age: Google cracks quantum supremacy
It’s the ‘eureka’ moment technologists and scientists have been yearning for.
More
24 Oct
Quantum computing will pose risks to enterprise encryption
“It is encouraging to see that so many companies understand the risk and challenges that quantum computing poses to enterprise encryption."
More
23 Oct
Hackers access NordVPN server, users unaffected
While being connected to the server, the hacker could only see what an ordinary ISP would see, but it could not have been personalised or linked to a particular user.
More
« First
‹ Prev
1
2
3
4
5
6
7
…
Next ›