Best Practice stories - Page 90
A look at the Fortinet-CIS collaboration & how it will change cyber risk management in ANZ
Mon, 31st Jul 2017
#
firewalls
#
network infrastructure
#
cybersecurity insurance
Fortinet and Australian Insurtech company Cyber Indemnity Solutions (CIS) are collaborating on a security assessment program.
NZ to stage international tech conference before D5 summit
Mon, 31st Jul 2017
#
nztech
#
d5
#
partners
The D5 provides a focused forum to collaborate on common projects and to support and champion our growing digital economies.
IBM X-Force takes on IoT security across connected devices - and vehicles
Wed, 26th Jul 2017
#
iot
#
ibm
#
ibm security
IBM X-Force researchers are expanding their focus to include vehicle and IoT security in response to a growing market for data connectivity in vehicles.
Google Groups users unwittingly leaking information: Change sharing settings now
Tue, 25th Jul 2017
#
google
#
proofpoint
#
redlock
Google has been the focus of two major security warnings this week, one of which exposes a major hole in Google Groups.
78% of UK data centres fail ASHRAE guidelines – is IoT the answer?
Tue, 25th Jul 2017
#
datacentre infrastructure
#
iot
#
risk & compliance
New research from thermal risk experts has revealed UK data centres are seriously lacking when it comes to temperature management.
You're invited: NAVIGATE, SailPoint's Identity Governance Conference
Mon, 24th Jul 2017
#
hcm
#
iam
#
cybersecurity
Next month SailPoint will bring together hundreds of professionals to discuss how to use identity for maximum effect at Navigate Sydney 2017.
Security expert shares tips to help SMEs fight off cyber attacks
Fri, 21st Jul 2017
#
cybersecurity
#
carbon black
#
opinion
With high-profile firms in the headlines, does it mean that SMEs face even greater risk? And if it does, what can the smaller entities do about it?.
Living off the land: How malware is on the verge of becoming fileless
Thu, 20th Jul 2017
#
malware
#
cybersecurity
#
symantec
'Living off the land' may at first sound like farms and vegetable patches, but it is quickly gaining a new meaning for cyber attackers and threats.
Center for Internet Security recognises Kiwi compliance firm
Mon, 17th Jul 2017
#
risk & compliance
#
security vulnerabilities
#
cis
A New Zealand security assessment and compliance system has received recognition from the US-based Center for Internet Security (CIS).
The reign of ransomware: How to protect your business from the ransomware onslaught
Mon, 17th Jul 2017
#
firewalls
#
network infrastructure
#
network security
Don't forget to scan your backups for vulnerabilities. It would be pointless transferring all your data onto a device that is always compromised.
Seven pieces of the IOT puzzle from Microsoft
Fri, 14th Jul 2017
#
uc
#
public cloud
#
iot
Microsoft unveils an expansive IOT toolkit, poised to revolutionise business, healthcare, and government operations.
The three Rs of enterprise security: Rotate, repave, and repair
Mon, 10th Jul 2017
#
gaming
#
advanced persistent threat protection
#
digital entertainment
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.
Frost & Sullivan recognizes Asia Pacific's best & brightest ICT firms
Fri, 7th Jul 2017
#
uc
#
ddos
#
hyperscale
Asia Pacific's biggest names in technology have topped the list at the 2017 Frost & Sullivan ICT Awards, held in Singapore last night.
Breaking down digital transformation: Process transformation
Fri, 7th Jul 2017
#
saas
#
digital transformation
#
iaas
The best way to start a digital transformation is with projects that offer potential for more rewards and less risk.
Four cyber security principles that withstand the test of time
Thu, 6th Jul 2017
#
endpoint protection
#
edr
#
software development
Information security can be a noisy place. As a career security guy my experiences have given me a deep understanding of attackers & the enterprise.
Securing assets and applications in the cloud
Mon, 3rd Jul 2017
#
devops
#
cloud security
#
iaas
Hard-coding and embedding credentials in the code or a script can initially make them easy to use – but this represents a significant vulnerability.
The age of containerisation and its impact on security
Fri, 30th Jun 2017
#
devops
#
application security
#
devsecops
A major concern is that enterprise adoption and deployment of DevOps and containers is outpacing the approach used to secure them.
Six essential steps to a successful cybersecurity program
Mon, 26th Jun 2017
#
endpoint protection
#
risk & compliance
#
edr
Firms are at a disadvantage in the fight against cybercriminals but building a mature cybersecurity program can help overcome those problems.
How to manage data analytics so all users can make sense of the insights
Wed, 21st Jun 2017
#
data analytics
#
martech
#
planning
Data analytics are only worth the time if firms can make smarter decisions faster than their competitors. But it's easy to get swept up in the flood.
Rackspace presents five ways to reduce your ransomware risk
Tue, 20th Jun 2017
#
malware
#
ransomware
#
encryption
Rackspace reveals key strategies to combat ransomware, emphasizing robust backups and vigilant patch management.