Industry insider news for New Zealand's technology resellers
These search results are from across the Techday network of sites
Sophos named a Numbering Authority in CVE programme
The programme, which runs an open data registry of vulnerabilities, enables programme stakeholders to correlate vulnerability information used to protect systems against attacks.
CompTIA forms Cybersecurity Advisory Council, led by 16 security execs
The new body will be co-chaired by Tech Data director of security solutions Tracy Holtz, and Alvaka Networks chief operating officer and chief information security officer Kevin McDonald.
22 billion records exposed from breaches in 2020 — report
The research also found that 35% of the breaches recorded by Tenable were caused by ransomware attacks, while 14% of breaches stemmed from email compromises.
Top security threats for 2021
2021 will see several themes develop into full blown security threats, many of them borne from the struggles of pandemic-stricken 2020, writes Wontok head of technology Mick Esber.
Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.
A brief history of cyber-threats — from 2000 to 2020
Many significant cybersecurity events have occurred since the year 2000 — not every one of them ‘firsts’, but all of them correlating with a change in security behaviour or protection.
The current state of ransomware — and its future
Discoveries made by analysts at Sophos have unearthed a new development: ransomware code appears to have been shared across ‘families’, and some of the ransomware groups seemed to work in collaboration more than in competition with one another.
The best DDoS protection depends on the use case
On-demand, always-on and hybrid models provide different services for different needs, writes Radware product marketing manager Eyal Arazi.
What does the future of infosecurity entail?
2020 has presented the world with constant changes, curveballs and shifts in business strategy. This has caused the infosecurity industry to implement real-world solutions which are likely to remain beyond the end of this global pandemic and into 2021.
How to protect applications across multiple clouds
While web application firewalls (WAFs) play a critical role in protecting applications, deploying and managing a WAF can be complicated and require ongoing refinement of security policies.
2020 saw a surge in detected malicious files — Kaspersky
Kaspersky detected more trojans, backdoors and worms than last year, representing an overall 5.2% increase in detected malicious files year-on-year.
Zscaler hires Steve Singer as new A/NZ country manager
Joining from Talend, where he held the similar role of A/NZ country manager, Singer will be charged with continuing Zscaler’s growth of its cloud security solutions for private and public sector enterprises.
Threat intelligence platforms underpin security efficiency and effectiveness
Intelligence management platforms now playing a much more global and cross-functional role in the cybersecurity sector, writes ThreatQuotient regional director for APJC Anthony Stitt.
How CISOs can come out on top of the cyber arms race
CISOs must determine what their organisation’s security goals are, including the organisation’s risk profile and appetite, and, of course, their budget.
Why accelerated cloud adoption exposes organisations to security risk
When the lines become blurred between work and personal online interaction, exposure to cyber-risks increase dramatically, writes Vectra AI director of security engineering for APJ Chris Fisher.
Incorporating OT for a holistic cybersecurity transformation
In part two of a three-part series, Nozomi Networks cybersecurity strategist Vincent Liu details the importance of integrating OT into the security operations centre, and why it is no longer optional for critical infrastructure companies and enterprises across Asia.
Zscaler rolls out new Cloud Protection solution
The solution, which implements a zero trust approach to cloud workloads, aims to minimise attack surfaces and enforces security across multi-cloud footprints.
Operational technology catches up with digital transformation
In part one of a three-part series, Nozomi Networks cybersecurity strategist Vincent Liu explains why organisations need to use cybersecurity to balance the risks of converging IT and operational technology (OT).
Malwarebytes expands protection suite, with focus on protecting remote workers
As part of the expansion, Malwarebytes has introduced new features to its platform to boost productivity for remote workers, including enhancements for its Brute Force Protection solution and its scan and detection engine.
Top security tips for online shoppers
Shoppers should follow these tips to guard against being cheated and defrauded when shopping online.
Is the 'fast follower' mentality holding back anti-money laundering in Australia?
The decade-old rules-based systems cannot keep up with sophisticated cyberattacks and money laundering threats on their own, writes FICO financial crimes leader for APAC Timothy Choon.
Claroty and CrowdStrike form partnership to protect industrial control system environements
The integration will deliver visibility into industrial control system (ICS) networks and endpoints, with a one-stop-shop for information technology (IT) and OT asset information directly within The Claroty Platform.
Video: 10 Minute IT Jams - Vectra AI exec discusses cybersecurity for Office 365
In Techday's second IT Jam with Vectra AI, we speak again with its head of security engineering Chris Fisher, who discusses the organisational impact of security breaches within Microsoft O365, why these attacks are on the rise, and what steps organisations should take to protect employees from attacks.
How a vantage point sees threats before they impact
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.