IT Brief New Zealand - Technology news for CIOs & IT decision-makers

Threat Landscape stories - Page 61

Endpoint security2

BYOD can be secure with the right measures

Mon, 25th Mar 2019
#
endpoint protection
#
mfa
#
iam
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Cybersecurity3 copy

Developing APAC countries most vulnerable to malware - Microsoft

Fri, 22nd Mar 2019
#
malware
#
ransomware
#
cybersecurity
The Asia-Pacific region remains a prime target for cybercriminals, according to Microsoft's Security Intelligence Report.
Untitled design  1

How business leaders must prioritise cyber risk - Palo Alto Networks

Wed, 13th Mar 2019
#
firewalls
#
network infrastructure
#
network security
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
Cryptojacking2

IBM Security: Cybercriminals focusing on cryptojacking

Mon, 4th Mar 2019
#
ibm security
#
report
#
powershell
IBM Security's 2019 report indicates a shift in cybercriminal tactics, with cryptojacking attacks doubling those of ransomware as hackers seek easier profits.
Identity and access management

SailPoint: Identity's role in data security and compliance

Thu, 28th Feb 2019
#
iam
#
cybersecurity
#
cloud services
Simply putting a perimeter around the network cannot effectively protect all of an enterprise's users and their access to business applications and data.
Cybersecurity20

New threats on the block: Formjacking, IoT, LotL attacks

Tue, 26th Feb 2019
#
iot security
#
iot
#
iiot
Cybercriminals shift focus from ransomware to formjacking and IoT exploits, with Symantec's latest report revealing tens of millions of dollars in losses.
Photo 2

Interview: Culture and cloud - the battle for cybersecurity

Thu, 21st Feb 2019
#
malware
#
cloud security
#
cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Cybersecurity breach2

Raising the stakes: McAfee's predictions for cybersecurity

Tue, 19th Feb 2019
#
ddos
#
iot security
#
casb
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Gettyimages 825138850

Flashpoint signs on emt Distribution as APAC partner

Fri, 15th Feb 2019
#
supply chain
#
threat intelligence
#
emt distribution
Flashpoint has partnered with emt Distribution to expand its business risk intelligence services in Southeast Asia and Oceania.
Screen shot 2019 02 13 at 5

Cybersecurity as a service answer to urgent change

Fri, 15th Feb 2019
#
cybersecurity
#
opinion
#
security-as-a-service
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Big data

Threat prioritisation feature announced for Tenable platforms

Tue, 12th Feb 2019
#
ai security
#
ai
#
ml
Predictive Prioritisation enables organisations to focus on the three percent of vulnerabilities that have been or will likely be exploited in the next 28 days.
Hacked

Email fraud increased by 476% in last year - Proofpoint

Fri, 8th Feb 2019
#
phishing
#
email security
#
proofpoint
As these threats continue to grow in volume and sophistication, it is imperative that organisations implement a people-centric security approach.
Big data1

Flashpoint: Contextual data key to effective security

Mon, 4th Feb 2019
#
data analytics
#
martech
#
planning
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.
Cybersecurity6

Dell partners with Secureworks and CrowdStrike on endpoint security offering

Mon, 4th Feb 2019
#
network infrastructure
#
endpoint protection
#
partner programmes
Dell's approach is designed to prevent, detect and respond to the shifting threat landscape, and makes it easy for organisations to protect their data.
Screen shot 2019 01 30 at 1

4 Reasons why CISOs should adopt threat intelligence

Thu, 31st Jan 2019
#
cybersecurity
#
ciso
#
threat intelligence
ThreatQuotient's Anthony Perridge believes the answer to security teams falling behind criminals is to deploy threat intelligence platforms.
Manufacturing   ot2

OT attacks and cryptominers on the rise – Skybox

Wed, 30th Jan 2019
#
cloud security
#
iot security
#
report
Skybox Security's 2019 Vulnerability and Threat Trends Report analyzes what shaped the threat landscape over 2018 and what it means for the year ahead.
Network security4

Check Point launches hyperscale network security solution

Wed, 23rd Jan 2019
#
firewalls
#
network infrastructure
#
hyperscale
Check Point introduces Maestro, a hyperscale network security solution, enabling elastic scalability and massive throughput for enterprises of all sizes.
Telecomms3

Achieving cyber resilience in the telco industry - Accenture

Mon, 21st Jan 2019
#
uc
#
ddos
#
devops
With hacking attempts surging, Singtel, SoftBank, Etisalat, and Telefónica have formed the Global Telco Security Alliance to bolster global cybersecurity.
1

CenturyLink opens new SOC in Singapore

Mon, 21st Jan 2019
#
ddos
#
advanced persistent threat protection
#
socs
CenturyLink boosts its global cybersecurity reach with a new Security Operations Centre in Singapore, targeting the Asia Pacific's pressing security needs.
Deops

The CISO view on DevOps: How to protect privileged access in the cloud

Mon, 21st Jan 2019
#
devops
#
cloud security
#
apm
CyberArk's latest report reveals critical insights from Global 1000 CISOs on securing DevOps privileged access, pushing for a balance with developer velocity.