Technology news for New Zealand's largest enterprises
These search results are from across the Techday network of sites
Why businesses need a strategy to combat the enemy within – Ping Identity
While strengthening your organisation’s external defences with the latest tools and technologies makes sound sense, it’s only half a battle plan.
Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard
Enterprises looking to reduce the risk of cyber-compromise or attack need to think about adding multi-factor authentication technology to their arsenal.
Board members in A/NZ most engaged in cybersecurity – Infosys
The research highlights how cybersecurity is a top priority for organisations in the A/NZ market, with boards taking a more hands-on approach to cybersecurity.
Govt invests $8m into refreshed Cyber Security Strategy
The Government has refreshed its approach to New Zealand’s cybersecurity, with more focus on partnerships, funding, and international participation.
Security risks of neglecting the workforce experience – Avaya
Government departments and enterprises are wasting millions of dollars every year on cybersecurity because they fail to also invest in the user experience.
Exclusive: VMware’s challenges and opportunities in cybersecurity
While it’s still critically important to have a strong perimeter, it is widely accepted now that the status quo of security simply doesn’t work anymore.
Deakin Uni scores double win with Exabeam partnership
Australia’s Deakin University is partnering with SIEM security company Exabeam in an effort to boost the university’s cybersecurity degree program and strengthen its SIEM capabilities.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
How business leaders must prioritise cyber risk - Palo Alto Networks
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
Flashpoint: Contextual data key to effective security
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.
LogRhythm: Foster a culture of cybersecurity awareness
According to the Australian Cyber Security Centre, the danger to local organisations has never been greater.
Achieving cyber resilience in the telco industry - Accenture
Whether hackers are motivated by greed, or a curiosity to assess a telco’s weaknesses; the interconnected nature of the industry places it in a position of increased threat
Implementing shared security models in the cloud
Developers aren’t usually aware of every control that should be implemented to ensure security in cloud environments.
How protecting critical infrastructure starts with securing social media
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Govt announces cybersecurity grants for SMBs
Over the next two years, eligible small businesses can apply for individual grants of up to $2,100.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Don’t let your network outgrow your IT team
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
Securing your cloud data: Point solutions vs single pane of glass
Organisations that can use fewer security products that individually offer more capability are likely to have a lower total cost of ownership.
The key pillars of strong cybersecurity strategies
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.
LogRhythm reports higher-than-anticipated SOAR adoption rate
The company’s embedded security orchestration, automation and response (SOAR) capabilities are embedded in its security information and event management offering.
More OT devices added to Tenable's industrial security offering
Most operational technology systems run in heterogeneous environments, with devices from numerous industrial vendors, often relying on unique, proprietary protocols.