IT Brief New Zealand - Technology news for CIOs & IT decision-makers

Best Practice stories - Page 81

Military intelligence

Blurred lines: How counterinsurgent strategies apply to threat hunting

Wed, 15th Aug 2018
#
endpoint protection
#
advanced persistent threat protection
#
edr
Successful counterinsurgency operations depend on thoroughly understanding the environments in which they are being conducted.
Sinclair3 1

What does WatchGuard bring to ANZ?

Tue, 14th Aug 2018
#
firewalls
#
network infrastructure
#
network security
WatchGuard Technologies is a cybersecurity vendor actively looking for new local channel partners. We asked what it is offering the ANZ market.
Thinkstockphotos 494345930

Foundation for open media software development launched

Mon, 13th Aug 2018
#
gaming
#
digital entertainment
#
open source
Academy of Motion Picture Arts and Sciences and The Linux Foundation launched the Academy Software Foundation with Weta Workshop as a founding member.
Sec 2

The new approach to AI: Why businesses rush to deploy machine learning

Mon, 13th Aug 2018
#
robots
#
supply chain
#
api
DataRobot launches Time Series, revolutionizing easy, accurate forecasting without need for specialist expertise.
Thinkstockphotos 1011699572

Data classification: What's the point of brushing off 'digital dust'?

Wed, 8th Aug 2018
#
storage
#
opinion
#
data classification
To a lot of us data is boring but a necessary evil. Our organisations create documents that end up being stored somewhere, gathering digital dust.
Thinkstockphotos 882329946

Finding the right MSSP for your business: A buyer's guide

Mon, 6th Aug 2018
#
trustwave
#
mssp
#
threat intelligence
Security. It's the supporting backbone of every business but it can often feel like an uphill struggle for internal security teams.
Motionstack

Exclusive: Is cloud migration at the centre of digital transformation?

Wed, 1st Aug 2018
#
migration
#
digital transformation
#
hcm
Oracle SOAR, the world's first automated enterprise cloud application upgrade solution, is helping businesses migrate to the cloud efficiently.
Bug code

Bug bounty marketplace in sore need of standardisation – report

Wed, 1st Aug 2018
#
report
#
bug bounty
#
crest
Bug bounty programmes lack standardisation, says a CREST report urging the establishment of best practices to protect researchers and organisations alike.
Equninix

Networking is experiencing a paradigm shift due to IBN

Tue, 31st Jul 2018
#
opinion
#
allied telesis
#
ibn
Intent-Based Networking set to transform network management with streamlined operations and AI-driven solutions.
Cyber sec

WatchGuard launches multi-factor authentication for SMBs

Mon, 30th Jul 2018
#
firewalls
#
network infrastructure
#
network security
WatchGuard launches AuthPoint, a cloud-based multi-factor authentication solution tailored for SMBs, addressing their cost and complexity concerns.
Thinkstockphotos 861122758 tlhceug

Interview: MuleSoft discusses the security risks in IoT

Thu, 26th Jul 2018
#
mulesoft
#
security by design
#
partners
IoT's rise poses grave security risks; enterprises seek secure integration and API-led strategies, experts say.
Thinkstockphotos 105492136

Fear of cyber risk is stunting growth in NZ businesses

Mon, 23rd Jul 2018
#
digital transformation
#
risk & compliance
#
ai
43% of New Zealand respondents say they have put off digital transformation because they are worried about cyber risks.
Thinkstockphotos 470368858

Developing a one-two punch for cloud security

Tue, 17th Jul 2018
#
data protection
#
cloud security
#
casb
When data is regularly accessed from a myriad of devices outside the corporate firewall, strategies to maintain effective security have to evolve.
Fred laluyaux preview

EXCLUSIVE INTERVIEW: Aera talk about their new brand and the ANZ market

Thu, 12th Jul 2018
#
data analytics
#
martech
#
planning
Aera, reborn from FusionOps under CEO Frederic Laluyaux, leverages USD $50 million in new funding to transform ANZ market with AI-driven supply chain solutions.
Secure banking

Use of banking trojans up 50%, cryptomining still dominant malware – report

Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point's latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Screen shot 2018 07 10 at 10

Time capsule app TimeHop breached, 21 million users affected

Tue, 10th Jul 2018
#
firewalls
#
mfa
#
cloud security
The breach occurred as an access credential to TimeHop's cloud computing environment that didn't have multifactor authentication was compromised.
Thinkstockphotos 817486416

Collaboration tool APIs leaving organisations vulnerable

Mon, 9th Jul 2018
#
uc
#
firewalls
#
breach prevention
Alongside the migration to the cloud has been the rise of application programming interfaces (APIs) and artificial intelligence (AI).
Pic   marina brook

Best practices: Preventing and recovering from ransomware attacks

Fri, 6th Jul 2018
#
malware
#
dr
#
ransomware
With ransomware attacks on the rise since 2017's WannaCry incident, organisations must adopt robust prevention and recovery measures to protect critical data.
Thinkstockphotos 522803512

PB Tech raked over coals by ComCom for dodgy practices

Tue, 3rd Jul 2018
#
commerce commission
#
pb technologies
#
court case
PB Tech admits to 14 charges of violating extended warranty rules, while also being warned for bait advertising, according to the Commerce Commission.
Cybersecurity breach2

Despite more training, SMBs feel unprepared for cyberattacks - Webroot

Mon, 2nd Jul 2018
#
malware
#
ransomware
#
phishing
Despite rigorous training, most SMBs in the US, UK, and Australia feel unprepared for cyber threats, says Webroot, highlighting the evolving nature of attacks.