SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Haystack stories - Page 2

Jask

Deep dive: How AI empowers today's security operations analysts

Tue, 14th Aug 2018
#
soc
#
ai
#
netevents
Artificial intelligence (AI) is transforming the Security Operations Center (SOC; reducing workload and improving detection times.
Gm jj rf with logo

JASK raises $25mil in Series B financing to advance security operations beyond SIEM

Tue, 3rd Jul 2018
#
siem
#
soc
#
ai
The company will continue its focus on platform development, increase hiring in all departments and expand global sales channels.
Thinkstockphotos 851956150

Understanding artificial intelligence and machine learning in digital business

Wed, 13th Dec 2017
#
ddos
#
hyperscale
#
public cloud
Machine learning is pivotal in AI, enhancing decision-making in robotics and enterprise applications alike. Major firms are integrating sophisticated AI tools.
Analytics

Workday bridges business intelligence silos with Prism Analytics

Wed, 11th Oct 2017
#
data analytics
#
martech
#
planning
The self-service analytics solution delivers context, security, and experience organisations need to uncover critical business insights.
Thinkstockphotos 483510067

AWS launches 'Macie', its newest machine learning security service

Wed, 16th Aug 2017
#
data protection
#
hyperscale
#
public cloud
Amazon Web Services (AWS) has welcomed the newest addition to its portfolio, a machine learning security service called Amazon Macie.
Thinkstockphotos 585287762

APAC takes 520 days too long to respond to threats, says FireEye

Tue, 30th Aug 2016
#
breach prevention
#
cybersecurity
#
hackers
New research has found that it is taking APAC much longer than the rest of the world to detect cyber threats: a median 520 days.
Crystal ball1

2016 Crystal Ball – the future of networking

Mon, 25th Jan 2016
#
network infrastructure
#
sd-wan
#
sdn
In 2016, SD-WAN will dominate networking with cost-effective, robust links and regionalised services, shaping the future of connectivity.
Techday 37598f8c2a4ea6708ea2

Ixia: Protecting enterprises from cyber attacks with new offering

Wed, 14th Oct 2015
#
cybersecurity
#
threat intelligence
#
haystack
Looking to protect enterprises from cyber attacks, Ixia has added ThreatAmor to its visibility architecture portfolio.
Data recovery

When 'just' is just not enough in data recovery

Thu, 17th Apr 2014
#
storage
#
dr
#
hyperscale
Data centre or not, resellers need to protect their customers' data, says Paul Caldwell, Storagecraft New Zealand country manager.
Gettyimages 488200977

Keep your friends close, but your enemies closer

Mon, 11th Mar 2013
#
apple
#
apple iphone
#
samsung galaxy
As Samsung gears up for its S4 launch, Apple enthusiasts wonder what's next. Insider tips hint at an iPhone revamp with cutting-edge tech.
Virtualised server security 1

Security: From hunted to hunter

Tue, 12th Feb 2013
#
semiconductors
#
soc
#
risk & compliance
As cyber threats evolve, traditional security measures fall short. Companies must pivot from passive defence to proactive threat hunting to stay secure.