SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Advanced Persistent Threat (APT) stories - Page 9

Cyber attacker

Cyber attacks develop complexity, target Windows sysad tools - report

Wed, 5th Dec 2018
#
malware
#
firewalls
#
ddos
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
Snet

Machine learning is a double-edged sword for cyber security

Mon, 8th Oct 2018
#
advanced persistent threat protection
#
ai
#
ml
IT departments and security decision-makers need to understand the complexity of AI in cyber security, and how to strike a balance between risk and reward.
Kaspersky

Cybersecurity risks that can result from Balkanisation in cyberspace

Fri, 21st Sep 2018
#
supply chain
#
kaspersky
#
kaspersky cyber security weekend
Kaspersky's cybersecurity weekend in APAC focuses on Balkanisation, examining how a fragmented internet threatens global cybersecurity and benefits criminals.
Fallback

Cybersecurity should be priority in US$8b smart utility spend

Thu, 23rd Aug 2018
#
ddos
#
smart cities
#
iot
Utilities are becoming increasingly connected worldwide, and also becoming increasingly vulnerable - so why are governments letting security slide?.
Leader

IDC names Trustwave 'leader' in APAC MSSP report

Mon, 6th Aug 2018
#
trustwave
#
mssp
#
analyst report
Trustwave has been named a leader in the IDC MarketScape: Asia/Pacific Managed Security Services 2018 report, moving up from the major player category.
Threat detection

Make the pre-emptive strike against cyberattacks with threat hunting

Mon, 23rd Jul 2018
#
firewalls
#
network infrastructure
#
network security
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.
Thinkstockphotos 147539280

Now you see me, now you don't: Security beyond the physical network

Wed, 16th May 2018
#
uc
#
vpns
#
verizon
A big shift in the way people work means organisations can no longer rely on the same legacy security models they have been using to date.
Thinkstockphotos 531615540

Cybercriminals phish 'the human factor' for everything it's worth

Mon, 23rd Apr 2018
#
phishing
#
email security
#
healthtech
Cyber attackers are increasingly preying on human vulnerabilities and less on technical system flaws to create mayhem.
Thinkstockphotos 817486028

New report delves deep into cybercrime - and forecasts its future

Fri, 6th Apr 2018
#
ddos
#
breach prevention
#
cybersecurity
Now in its tenth year, Trustwave has released its encyclopaedic report that details both current and future threats that are crucial to be aware of.
Thinkstockphotos 900256936

Cloud security alert - why log files are not the answer

Thu, 5th Apr 2018
#
cloud security
#
ixia
#
opinion
Anyone responsible for IT security needs a strategy for monitoring what is happening in their company's cloud.
Thinkstockphotos 483166983

Unisys teams up with Cylance to offer managed security services with endpoint protection

Thu, 29th Mar 2018
#
endpoint protection
#
ai security
#
edr
Unisys and Cylance partner to launch a global managed security service, combining endpoint protection with advanced AI and machine learning technologies.
Thinkstockphotos 522489079

Businesses face 'cyber black holes' without complete visibility

Fri, 23rd Mar 2018
#
iot security
#
forescout technologies
#
network visibility
High-profile breaches tend to have a similar storyline: old, unpatched vulnerabilities, advanced persistent threats, and a lack of visibility.
Thinkstockphotos 820243528

Analyst taps Webroot as “trail blazer” in APT protection

Thu, 15th Mar 2018
#
endpoint protection
#
ai security
#
edr
Webroot says it was recognised by Radicati Group for its real-time, cloud-based approach to preventing malware.
Pexels photo 179993

Expert insights: Why visibility and forensics matter in cybersecurity

Wed, 13th Dec 2017
#
cybersecurity
#
opinion
#
cybercrime
​A Six-Point Checklist for making sure that your security teams have the capacity to track the root causes and progress of noxious malware
.
Fallback

How to keep your company safe from complex cyber threats

Mon, 6th Nov 2017
#
sonicwall
#
hack
#
computers
An advanced persistent threat is a set of stealthy and continuous computer hacking processes, designed to be evolving, polymorphic and dynamic...
Thinkstockphotos 122566752

WatchGuard snaps up former IBM sales lead for APAC role

Thu, 26th Oct 2017
#
malware
#
firewalls
#
network infrastructure
WatchGuard Technologies has snapped up former IBM sales leader Sylvain Lejeune as its new vice president of sales for Asia Pacific and Japan.
Thinkstockphotos 539085410

The 'treacherous 12': Top threats to cloud computing revealed

Fri, 20th Oct 2017
#
cloud security
#
cybersecurity
#
cloud services
The most prominent threats to cloud computing have been identified in a comprehensive report from the Cloud Security Alliance (CSA).
Thinkstockphotos 546461564

Rackspace ramps up Fanatical Support for Microsoft offerings

Tue, 26th Sep 2017
#
dr
#
public cloud
#
risk & compliance
Fanatical Support for Microsoft Azure is now available for customers with Payment Card Industry (PCI) workloads on Azure.
Thinkstockphotos 113494458

Security firm reveals Asia connections behind the CCleaner hack

Tue, 26th Sep 2017
#
advanced persistent threat protection
#
supply chain
#
hack
The attack was never intended for consumers, but instead went after companies such as NEC, Samsung, Asus, Fujitsu, Singtel, Intel and VMware.
Screen shot 2017 09 12 at 10

Expert spells out how businesses can 'block the spears'

Tue, 12th Sep 2017
#
malware
#
email security
#
cybersecurity
There is no doubt about it, but spear-phishing is big business in 2017 - Menlo Security's Jason Steer explains how businesses can protect themselves.