SecurityBrief New Zealand logo
New Zealand's leading source of cybersecurity and cyber-attack news

Data Protection news stories - Page 2

Story image
Forcepoint
Putting data first: Managing regulations, protection and business agility
By putting data at the centre of cybersecurity infrastructures, enterprises can achieve consistent enforcement anywhere their people work.
Story image
Data Protection
Cloudera brings data protection capabilities to AU
Cloudera is bringing new data protection capabilities to customers in Australia with Cloudera Data Platform (CDP) Public Cloud Regional Control Plane.
Story image
Gartner
Uptick in privacy-driven spending reflects growing importance of data protection worldwide
Customer demand is driving a mandate for digital ethics in businesses, resulting in more legislation to protect data privacy and data security.
Story image
McAfee
McAfee announces online protection service to protect people not products
In a statement the company said these announcements indicate a major shift in McAfee’s strategy to deliver an integrated and intuitive online protection service to protect people rather than point products that secure devices.
Story image
Ransomware
Veritas: The time has come to address COVID-19 related security gaps
"With the challenges wrought by the COVID-19 pandemic, and Australian businesses were right to prioritise the shift to remote working. Now though, the time has come to take action and redress the balance.”
Story image
Integration
Ava Security and Nedap partner up, lead way for security integration
Integrations between security providers are important because of an increasing demand for real-time insights, cybersecurity protection, situational awareness and the ability to perform accurate and fast investigations.
Story image
Barracuda
Barracuda launches tool to help enterprises protect sensitive data
“Barracuda Data Inspector is next-generation data security that makes it easy to identify and secure an organisation's most critical information.”
Story image
Commvault
Commvault launches new ransomware services to better protect customers
"We believe that by offering strategic protection plans, we can support customers at any stage of a ransomware attack - and do our best to help prevent it altogether with Commvault Protection Review."
Story image
Data Protection
Fivetran offers enterprises higher protection for sensitive data
"We're proud to offer Fivetran Business Critical to help our customers keep their data protected and manage a myriad of security requirements, while reducing the complexity of their modern data stack.”
Story image
Veeam
Organisations look to cloud for data protection, but on-prem remains resilient - Veeam report
“The IT world is undeniably hybrid and not in “transition” before the data centre goes away," the report notes.
Story image
Arcserve
Arcserve and Nutanix work to secure hybrid cloud infrastructures
"The Arcserve solution, powered by Nutanix, helps deliver simplicity, resilience, and peace of mind to our customers by helping them to stay ahead of security vulnerabilities and ransomware in a hybrid multi-cloud era."
Story image
Cloud
PCI SSC and CSA push for businesses to properly scope cloud environments
In order to highlight the importance of properly scoping cloud environments, PCI Security Standards Council (PCI SSC) and the Cloud Security Alliance (CSA) have come together to release a joint bulletin.
Story image
Trend Micro
Aus organisations under fire from persistent and sophisticated cyber attacks
“Once again we've found plenty to keep CISOs awake at night, from operational and infrastructure risks to data protection, threat activity and human-shaped challenges."
Story image
Cybersecurity
Video: 10 Minute IT Jams - Traditional cybersecurity vs data protection
Forcepoint's channel director discusses the differences between cybersecurity and data protection and how to improve data protection capabilities.
Story image
Cybersecurity
DHBs refuse to release information on cyber security systems
The country's district health boards are refusing to release reviews done of their cyber security systems, seven weeks after the Waikato DHB was struck by ransomware attackers.
Story image
Amazon Web Services / AWS
Micro Focus's CyberRes announces automated data protection for Amazon Macie
Cybersecurity company CyberRes has announced an automated data protection for Amazon Macie.
Story image
Veeam
Veeam hires new channel sales chief for A/NZ
Klasie Holtzhausen will manage Veeam’s regional channel teams and engage with its 2,500 partners and distributors to continue delivering data protection.
Story image
Data Protection
Data privacy software market to almost double between 2020 and 2025
Research from IDC has revealed that worldwide revenues of data privacy management software grew by 46.1% year-over-year in 2020.
Story image
Cybersecurity
Cyber security breach reports rise 25%
The number of cyber security incidents reported in this country has risen 25 percent since the same time last year.
Story image
Data Protection
Number porting fraud prompts extra measure from telcos
Telcos have banded together in an attempt to stamp out a relatively uncommon but potentially devastating type of fraud.
Story image
Ransomware
Ransomware response and recovery: Challenges and solutions
Ransomware is causing significant business impacts such as business disruption, data loss, reputational damage, remediation costs, and legal costs.
Story image
Disaster Recovery
Greater demand for modern data protection, disaster recovery as COVID sees increase in attacks
Data-driven organisations must evaluate evolving requirements for backup and disaster recovery to combat emerging workload challenges.
Story image
Data Protection
Quest Software launches solutions for operations, protection and governance
"We are excited about this new strategic direction and believe it will deliver strong value for our global customers as they further their data-centric transformation projects."
Story image
GDPR
Five things ANZ businesses should know about storing customers’ data
Businesses need to correlate events intelligently across multiple threat surfaces, application layers, and time spans to connect event A, to event B, to event C — even if they are months apart.