FutureFive New Zealand - Consumer technology news & reviews from the future

Cyber Threat stories - Page 95

Thinkstockphotos 613540820

CrowdStrike compiles 'casebook' of cybersecurity's important lessons

Mon, 11th Dec 2017
#
advanced persistent threat protection
#
ai security
#
ai
The casebook found that attack trends towards fileless malware, such as those that execute code from memory, made up 66% of all attacks.
Fallback

Half of IT executives want to detect in-progress attacks before it's too late

Tue, 17th Oct 2017
#
advanced persistent threat protection
#
threat intelligence
#
cyber threat
Nearly half of IT executives seek real-time threat detection, reveals an RSA study, pointing to automation as a key tool to speed up response times.
Thinkstockphotos 495569967

How to drop complexity and move to a more efficient security strategy

Fri, 18th Aug 2017
#
siem
#
advanced persistent threat protection
#
centurylink
Organisations should shift their focus from reacting to cyber threats to adopting proactive measures, according to CenturyLink.
Mountain documents

Comodo opens up threat library to public – almost 100m incidents in Q217 alone

Fri, 11th Aug 2017
#
advanced persistent threat protection
#
cybersecurity
#
cyber threat
​Comodo has opened its 'library' to university, governmental, and non-profit educators and researchers in an industry-first.
Thinkstockphotos 611992272 xqmbhnj

Palo Alto Networks & INTERPOL finalise major threat-sharing intelligence agreement

Tue, 8th Aug 2017
#
firewalls
#
network infrastructure
#
network security
Palo Alto Networks will soon be the first cybersecurity company in the world to sign a Data Exchange Agreement with INTERPOL.
Thinkstockphotos 600161484

Isolation no excuse: NZ must change its risk management approach to survive the future

Wed, 2nd Aug 2017
#
dr
#
advanced persistent threat protection
#
supply chain
New Zealand must adopt a collaborative approach to risk management in order to survive an uncertain future, says expert.
Thinkstockphotos 814753938

Fortinet's top tips for cultivating situational awareness of cyber threats

Wed, 19th Jul 2017
#
firewalls
#
network infrastructure
#
network security
IT professionals urged to improve situational awareness to better defend against cyber threats, says cybersecurity provider Fortinet.
Thinkstockphotos 496105004

Why User Behaviour Analytics are the secret weapon in your security strategy

Mon, 27th Mar 2017
#
vpns
#
data analytics
#
siem
UBA is valuable for detecting user access anomalies. If there are multiple VPN sessions from a foreign country at 2am, alarm bells should be ringing.
Fallback

The time is now - Secure your organisation from threats you can and can't see

Wed, 1st Mar 2017
#
application security
#
advanced persistent threat protection
#
software
There are two types of companies; Those that have been hacked, and those who don't know they have been hacked.
Thinkstockphotos 99539412

Check Point joins Cyber Threat Alliance alongside global security heavyweights

Tue, 21st Feb 2017
#
advanced persistent threat protection
#
cyber threat
#
cyber threat alliance
Check Point is the sixth member in the global Cyber Threat Alliance (CTA), alongside Cisco, Fortinet, Intel Security, Palo Alto Networks and Symantec.
Thinkstockphotos 533611055 16f6ffe

Opportunistic cyber attacks most dangerous, says SecureWorks report

Fri, 17th Feb 2017
#
malware
#
ransomware
#
advanced persistent threat protection
SecureWorks' new report reveals a way for organizations to fight opportunistic cyber attacks and highlights pitfalls in the security industry.
Thinkstockphotos 541865056

Digital Shadows on why it's sometimes best to avoid 'Cupid's' arrow

Mon, 13th Feb 2017
#
ddos
#
advanced persistent threat protection
#
opinion
Different times of the year and major news events can trigger a surge in attacks aimed at particular industries and geographies.
Data breached by hacker

Need to know: The dark side of the IoT and how to protect your business

Wed, 14th Dec 2016
#
iot
#
advanced persistent threat protection
#
cybersecurity
The IoT has opened the world of cyber threats directly into your living room & beyond - here is an expert's advice for protection.
Thinkstockphotos 511068126

Healthcare organisations in the crosshairs of Gatak

Mon, 28th Nov 2016
#
malware
#
advanced persistent threat protection
#
cybersecurity
The group behind the Gatak Trojan (Trojan.Gatak) continues to pose a threat with the healthcare sector heavily affected by attacks.
Thinkstockphotos 472661818

Providing threat support in a 'landscape that's constantly evolving'

Wed, 12th Oct 2016
#
malware
#
advanced persistent threat protection
#
cybersecurity
Juniper Networks has announced enhancements to its security portfolio to help organisations combat evolving threats.
Symantec

New MD for Symantec Pacific region

Wed, 8th Jul 2015
#
advanced persistent threat protection
#
cloud services
#
symantec
Ian McAdam will lead and drive growth across Symantec's enterprise security business and support customers and partners in the Pacific region.
Gettyimages 1181166035

Check Point launches cloud network to fight cybercrime

Thu, 19th Apr 2012
#
advanced persistent threat protection
#
cybersecurity
#
cyber threat
Check Point unveils ThreatCloud, a new cybercrime-fighting network, alongside their latest security software to bolster global defences.
National cyber security center 3

Government opens national cyber security centre

Tue, 1st Nov 2011
#
advanced persistent threat protection
#
ncsc
#
cyber threat
The government has opened its new National Cyber Security Centre (NCSC), fulfilling a part of its cyber security strategy released in June.
China flag

Fibre Watch: To Sydney, via Beijing?

Thu, 6th Oct 2011
#
network infrastructure
#
advanced persistent threat protection
#
spying
Concerns about Chinese involvement in a second trans-Tasman submarine fibre cable spark debate over potential espionage risks versus economic necessity.
Fallback

Suspicious minds

Fri, 1st Oct 2010
#
phishing
#
advanced persistent threat protection
#
email security
A staggering 88% of all email sent is either unwanted spam, or malicious communication, according to M86 Security. Are we fighting a losing security battle?.