Technology news for New Zealand's largest enterprises
These search results are from across the Techday network of sites
How to go threat hunting: The thrill of the hunt
Let’s go threat-hunting. When the hunters and tools have been assembled, let us explore the thought processes that prepare them for a successful hunt.
WannaCry shines spotlight on data privacy and compliance regulations
In the case of a ransomware attack, the liability and consequences to victims can often stretch far beyond the results of lost data.
Cybersecurity holds firm during former South Korean PM's indictment
"Park’s supporters might attempt to delete or taint evidence and the risk of other cyber attackers hoping to profit by leaking the latest evidence."
How to protect your organisation from WannaCry ransomware
We found that the ransomware does not have any truly novel tricks up its sleeve. It is standard ransomware.
What we can learn from the Google Docs hack
Remember, don’t be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
Carbon Black beefs up solution to lock down data center servers
Carbon Black is on a mission to lock down data center servers, at a time when server breaches are amongst the most common cyber attacks.
Don’t rebuild it, protect it: Safeguard your company against cyber attacks
The very bones of your organisation is at risk; IP, loss of sensitive data, reputation, and the efficient daily running of your business.
Carbon Black: How to set up a threat hunting program
We know the attackers are out there – they are perpetually trying to break in, and many are succeeding.
Carbon Black asks: So what exactly is threat hunting?
Information security professionals used to put all of their chips towards incident prevention. This didn’t work out very well.
Strategy for cyber crime: own the routers, own the Internet
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.
Security researchers cite non-malware attacks as biggest business risk
Forget malware - new research from Carbon Black says that non-malware attacks are the biggest risk for businesses right now.
Australia highlights region’s commitment to cyber security
It’s easy to get bogged down in the weeds and become polarised on the multitude of dangerous threats to our cyber identities and our businesses.
Espionage expert offers five viewpoints on state-sponsored hacking
Carbon Black sits down with former CIA operative Eric O'Neill to talk state sponsored attacks and why the ANZ regions is probably not a future target.
How Australia’s ‘Essential Eight’ sets the standard for sensitive data protection and breach notification
Globally, more and more jurisdictions are releasing mandates that will have a substantial impact on companies regarding breach notification.
Weekly AU security roundup: Hackers speak out, CyberArk, unpatched software and Yahoo’s CEO
SecurityBrief Australia revisits the biggest stories from the week that was.
Weekly NZ security roundup: RedShield, Palo Alto Networks, non-malware attacks and firewalls
SecurityBrief New Zealand revisits the biggest stories from the week that was.
How to detect and stop a non-malware (or fileless) attack
This year might just be "the year of non-malware attacks". Let’s take a step back and understand what we're up against and what can be done.
M.Tech signs distie deal with Carbon Black for AU resellers
“Carbon Black’s flexible partner model enables our partners to serve customers the best technology in the most appropriate method.”
Carbon Black receives perfect 100% for critical system protection
Carbon Black has been revealed as the only vendor to receive a perfect 100% prevention score in NSS Labs’ Advanced Endpoint Protection Test.
Carbon Black claims ‘breakthrough’ approach to endpoint security
Carbon Black has eyed endpoint security market, with the launch of a new solution that it claims stops more attacks than machine learning antivirus.
Beware the blind spot in phishing education
A common blind spot in training corporate staff to identify and avoid cyber attacks is the targeted phishing attack.
Cyber insurance is only part of the overall security equation
Latest statistics show that more than 28 billion people will be connected to the Internet of Things in 2017, rising to 34 billion-plus next year.
When antivirus fails, here’s how to choose next-gen antivirus
The ineffectiveness of traditional antivirus , which catches less than half of noteworthy malicious events, is causing untold damage to organisations.
Think like a bad guy and fight back, because hacking is the new face of espionage
When you imagine the world of espionage, do you think of undercover agents trying to recruit a mole or cracking safes to steal sensitive information?