IT Brief New Zealand - Technology news for CIOs & IT decision-makers

Best Practice stories - Page 90

Thinkstockphotos 820375988 amowuap

A look at the Fortinet-CIS collaboration & how it will change cyber risk management in ANZ

Mon, 31st Jul 2017
#
firewalls
#
network infrastructure
#
cybersecurity insurance
Fortinet and Australian Insurtech company Cyber Indemnity Solutions (CIS) are collaborating on a security assessment program.
Aucklanddddd

NZ to stage international tech conference before D5 summit

Mon, 31st Jul 2017
#
nztech
#
d5
#
partners
The D5 provides a focused forum to collaborate on common projects and to support and champion our growing digital economies.
Thinkstockphotos 653513498

IBM X-Force takes on IoT security across connected devices - and vehicles

Wed, 26th Jul 2017
#
iot
#
ibm
#
ibm security
IBM X-Force researchers are expanding their focus to include vehicle and IoT security in response to a growing market for data connectivity in vehicles.
Thinkstockphotos 483763376

Google Groups users unwittingly leaking information: Change sharing settings now

Tue, 25th Jul 2017
#
google
#
proofpoint
#
redlock
Google has been the focus of two major security warnings this week, one of which exposes a major hole in Google Groups.
Screen shot 2017 07 24 at 4

78% of UK data centres fail ASHRAE guidelines – is IoT the answer?

Tue, 25th Jul 2017
#
datacentre infrastructure
#
iot
#
risk & compliance
New research from thermal risk experts has revealed UK data centres are seriously lacking when it comes to temperature management.
Fallback

You're invited: NAVIGATE, SailPoint's Identity Governance Conference

Mon, 24th Jul 2017
#
hcm
#
iam
#
cybersecurity
Next month SailPoint will bring together hundreds of professionals to discuss how to use identity for maximum effect at Navigate Sydney 2017.
Thinkstockphotos 98081239

Security expert shares tips to help SMEs fight off cyber attacks

Fri, 21st Jul 2017
#
cybersecurity
#
carbon black
#
opinion
With high-profile firms in the headlines, does it mean that SMEs face even greater risk? And if it does, what can the smaller entities do about it?.
Thinkstockphotos 57437131

Living off the land: How malware is on the verge of becoming fileless

Thu, 20th Jul 2017
#
malware
#
cybersecurity
#
symantec
'Living off the land' may at first sound like farms and vegetable patches, but it is quickly gaining a new meaning for cyber attackers and threats.
Thinkstockphotos 695907984

Center for Internet Security recognises Kiwi compliance firm

Mon, 17th Jul 2017
#
risk & compliance
#
security vulnerabilities
#
cis
A New Zealand security assessment and compliance system has received recognition from the US-based Center for Internet Security (CIS).
Thinkstockphotos 805660030

The reign of ransomware: How to protect your business from the ransomware onslaught

Mon, 17th Jul 2017
#
firewalls
#
network infrastructure
#
network security
Don't forget to scan your backups for vulnerabilities. It would be pointless transferring all your data onto a device that is always compromised.
Thinkstockphotos 623372624

Seven pieces of the IOT puzzle from Microsoft

Fri, 14th Jul 2017
#
uc
#
public cloud
#
iot
Microsoft unveils an expansive IOT toolkit, poised to revolutionise business, healthcare, and government operations.
Thinkstockphotos 502056875

The three Rs of enterprise security: Rotate, repave, and repair

Mon, 10th Jul 2017
#
gaming
#
advanced persistent threat protection
#
digital entertainment
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.
Thinkstockphotos 621993166

Frost & Sullivan recognizes Asia Pacific's best & brightest ICT firms

Fri, 7th Jul 2017
#
uc
#
ddos
#
hyperscale
Asia Pacific's biggest names in technology have topped the list at the 2017 Frost & Sullivan ICT Awards, held in Singapore last night.
Thinkstockphotos 639636258

Breaking down digital transformation: Process transformation

Fri, 7th Jul 2017
#
saas
#
digital transformation
#
iaas
The best way to start a digital transformation is with projects that offer potential for more rewards and less risk.
Thinkstockphotos 492194738

Four cyber security principles that withstand the test of time

Thu, 6th Jul 2017
#
endpoint protection
#
edr
#
software development
Information security can be a noisy place. As a career security guy my experiences have given me a deep understanding of attackers & the enterprise.
Thinkstockphotos 498749678

Securing assets and applications in the cloud

Mon, 3rd Jul 2017
#
devops
#
cloud security
#
iaas
Hard-coding and embedding credentials in the code or a script can initially make them easy to use – but this represents a significant vulnerability.
Thinkstockphotos 693033964

The age of containerisation and its impact on security

Fri, 30th Jun 2017
#
devops
#
application security
#
devsecops
A major concern is that enterprise adoption and deployment of DevOps and containers is outpacing the approach used to secure them.
Thinkstockphotos 641884830

Six essential steps to a successful cybersecurity program

Mon, 26th Jun 2017
#
endpoint protection
#
risk & compliance
#
edr
Firms are at a disadvantage in the fight against cybercriminals but building a mature cybersecurity program can help overcome those problems.
Thinkstockphotos 637213452

How to manage data analytics so all users can make sense of the insights

Wed, 21st Jun 2017
#
data analytics
#
martech
#
planning
Data analytics are only worth the time if firms can make smarter decisions faster than their competitors. But it's easy to get swept up in the flood.
Thinkstockphotos 585162630

Rackspace presents five ways to reduce your ransomware risk

Tue, 20th Jun 2017
#
malware
#
ransomware
#
encryption
Rackspace reveals key strategies to combat ransomware, emphasizing robust backups and vigilant patch management.