SecurityBrief New Zealand logo
New Zealand's leading source of cybersecurity and cyber-attack news

Threat monitoring news stories

Story image
Data Protection
Mandiant launches digital risk protection offering
Mandiant has launched a digital risk protection offering that allows security leaders to proactively mitigate threats before they disrupt business operations.
Story image
Cybersecurity
Could New Zealanders initiate a cyber attack from within?
The threat landscape is significantly increasing worldwide, and the opportunities it presents are a growing concern in Aotearoa.
Story image
Malware
New vulnerabilities found in Nuspire’s Q1 2022 Threat Report
“Threat actors are quickly adjusting their tactics and these exploits tend to get industry attention, but the threat posed by older and attacks still persists."
Story image
Endpoint detection and response / EDR
Qualys steps into future of EDR with latest release
Qualys has launched Multi-Vector EDR 2.0 with additional threat-hunting and risk mitigation capabilities, designed to improve alert prioritisation.
Story image
Cyber Threats
IriusRisk launches OTM Standard to transform threat modelling
The OTM Standard, released as part of version 4.1 of the IriusRisk product, is an agnostic way of describing a threat model in a simple format.
Story image
Malaysia
New roundtable series by The Malaysia Global Business Forum to discuss threat matrix in digital economy
The Malaysia Global Business Forum (MGBF) has announced the launch of a new roundtable series titled "The Evolving Threat Matrix of the Digital Economy".
Story image
Data Protection
Barracuda launches updated email protection backed by API-based AI tech
"Barracuda Email Protection offers customers complete protection by combining gateway defence, API-based inbox defence, incident response, data protection, and user security awareness capabilities."
Story image
Collaboration
IriusRisk's latest threat modelling platform advances collaboration and visualisation
“This latest version of the IriusRisk platform marks a new level of maturity in the threat modelling world and will help us deliver on our ultimate objective: to make threat modelling an easily adoptable, mainstream practice."
Story image
DNS attacks
DNS attacks on the rise, organisations remain unprepared
"The latest data indicates that organisations need to remain vigilant, close security gaps, and patrol for potential breaches around the clock.”
Story image
Cybersecurity
PwC and Palo Alto Networks partner, providing 24/7 cybersecurity defence in New Zealand
PwC and Palo Alto Networks announce an expanded partnership strengthening cybersecurity defences for New Zealand businesses. 
Story image
Cloud Security
Trend Micro given the highest score in threat prevention report
Independent research firm Forrester has given Trend Micro the highest possible score in threat prevention.
Story image
Breach Prevention
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.
Story image
Cybersecurity
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. 
Story image
Surveillance
A winning proposition for critical infrastructure
When is a surveillance system more than a surveillance system? When it not only protects an organisation’s premises but also supports efficient, reliable operations, and health and safety.
Story image
Cloud
CrowdStrike launches threat-scoring platform
CrowdScore is a metric that enables CSOs to instantly see the real-time threat level their organisations are facing, allowing them to mobilise resources to respond.
Story image
Ransomware
Don’t let fear win: saying no to ransomware
“Agreeing to pay a ransom demand isn’t conducive to long-term security, and emboldens cyber criminals to continue to use this method.”
Story image
Intellectual property
Nearly half of all employees are willing to share business secrets
Insider threat is real, according to a new report that highlights employee behaviour around sharing corporate information.
Story image
Cloud
SolarWinds acquires Trusted Metrics, adds threat monitoring offering for MSSPs
The acquisition will allow SolarWinds to offer a new security software product, dubbed SolarWinds Threat Monitor.