Breach Prevention stories - Page 2
Is your IT team experiencing alarm fatigue? Create a rapid response to cyber threats
IT teams are experiencing 'alarm fatigue' and they are lagging behind. Here's how you can transform your teams to achieve rapid response.
The 'wargames' are on: Unisys launches threat simulation services
“The stakes are extremely high for averting any crisis that can result in brand damage, market devaluation or customer loss."
Seceon scores Indian reseller deal with Mahindra Special Services
"Our relationship with MSSG will enable more customers to see and stop these threats as they happen and before they inflict damage."
Prevention vs Detect & Response or Of Fools and Novelty
There is one type of fool that believes that everything old is best, and the other type of fool that believes everything new is better.
EXCLUSIVE: CrowdStrike talks APAC, cyber security, EDR & nation-state attacks
Michael Sentonas, CrowdStrike's vice president for Technology Strategy explains why the company has launched in Australia, & biggest security threats.
The key to deterring cyber crims? Make an attack not worth their time
"Increasing the cost of an attack by forcing hackers to create new methods when they attempt to breach a system, will reduce the number of attacks."
CyberArk launches cyber security membership
“Privileged account security has become increasingly critical, since compromised account credentials are a common denominator of many attacks."
Email prime target for cyber attacks, FirstWave responds with domain filter
"This new filter has been designed to deflect and block sophisticated email phishing threats targeting the wider attack surface of email users."
Watch out, there's a new breed of cyber criminal in town
“Advanced criminal attack groups now mirror the skill sets of nation-state attackers. They have well resourced and highly-skilled technical staff."
Behavioural attack detection may be a saving grace for Aussie businesses
LightCyber has partnered with M.Tech to bring behavioural attack detection to the Australian market in response to the escalating data breach crisis.
Dangerous Android banking Trojan breaks into Google Play store
Identified as ‘one of the most dangerous Android banking Trojans ever seen', the Acecard malware is capable of attacking users of nearly 50 apps.
Today's threats requires targeted security, BlackRidge says
BlackRidge has revealed advanced in its identity-based network security protection offering, and has also joined IBM's z Systems partner programme.
FireEye acquisition a 'game changer' for threat management
FireEye has acquired Invotas in order to offer security orchestration capabilities as part of its global threat management platform.
Kiwi SMEs: Will you earn the ‘cyber security tick’?
“Small and medium businesses need to take steps to protect their online records as much as they keep their buildings and physical assets safe."
Collaboration key component of threat prevention
A crucial part of threat prevention is collaboration between businesses, and now more than ever it's necessary to build a cyber security ecosystem.
Organisations unprepared for the greatest security risks, survey finds
Cyber attackers posing as legitimate insiders represent the greatest security risks to organisations, according to a new survey by CyberArk.
Understanding sophisticated attacks with TI and Core Security
“Defending your organisation’s critical assets and data from a breach is not a game."
Cloud Security Alliance establishes threat sharing scheme
Collaboration between vendors and businesses is a crucial part of ensuring attack reports are up-to-the-minute and provide specific info about threats
Cisco unleashes extended security offerings
Cisco has added to its security offerings and services with three significant expansions.
Warning: Ransomware email campaign on a rampage
Internal Affairs is warning people to beware of a ransomware email campaign that could cripple IT systems.
Symantec: Targeted attacks rife, unified protection to the rescue
"Customers today need all three security constants – intelligence, solutions and people – to work together for comprehensive protection."
Macro-based malware is back, says Microsoft
The Microsoft Malware Protection Centre (MMPC) has released a blog post to inform people macro-based malware is being used more frequently.
Imperva expands security solutions with DDoS offerings
Imperva has added two Distributed Denial of Service (DDoS) protection services to its offerings.
Advanced threat protection: Now more than ever
Joshua Alcock, Fortinet senior systems engineer, outlines the five critical components to advanced threat protection.