FutureFive New Zealand - Consumer technology news & reviews from the future

Threat Landscape stories - Page 60

Gettyimages 913641980

Kaspersky Lab signs on Dicker Data for ANZ

Wed, 8th May 2019
#
endpoint protection
#
edr
#
cybersecurity
Kaspersky Lab ANZ and Dicker Data team up to drive cybersecurity solutions to Australian and New Zealand mid-market, SMB, and enterprise customers.
Reactions

14 partner and customer reactions to Red Hat's Enterprise Linux 8 announcement

Wed, 8th May 2019
#
devops
#
apm
#
open source
Enterprise Linux 8 from Red Hat gets a warm reception from industry giants like Google Cloud, IBM, and Microsoft. Here's what partners and customers are saying.
Cybersecurity key

Trustwave brings database security scanning to the cloud

Thu, 2nd May 2019
#
cloud security
#
cybersecurity
#
microsoft
Trustwave debuts DbProtect to shield databases against cyber threats, enhancing security across cloud platforms.
Award3

LogRhythm SIEM named Gartner Customer Choice

Wed, 1st May 2019
#
siem
#
cybersecurity
#
logrhythm
This is the third consecutive time LogRhythm been recognised as a Customers' Choice, which is determined based on independently verified feedback and ratings.
Gettyimages 1141007335

SecureWorks speeds up threat detection through analytics

Tue, 30th Apr 2019
#
endpoint protection
#
data analytics
#
martech
SecureWorks has embraced software-as-a-service (SaaS) to protect customers and transform the detect-investigate-respond process towards cyber threats.
Cybersecurity24

Cyber threats progressing as defenses evolve - Trustwave

Mon, 29th Apr 2019
#
cybersecurity
#
trustwave
#
report
Trustwave's 2019 Global Security Report reveals a sharp rise in focused cyber threats and highlights the ongoing evolution of both attacks and defences.
Gettyimages 1016968886

emt Distribution adds risk intelligence vendor

Wed, 24th Apr 2019
#
data analytics
#
martech
#
planning
Flashpoint has signed emt Distribution to provide channel partners in Oceania and South East Asia a solution for illicit threat actor communities.
Gettyimages 535898187

Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach

Thu, 18th Apr 2019
#
data analytics
#
martech
#
planning
Faced with an overload of 'critical' vulnerabilities, Tenable turns to predictive solutions, launching a tool that targets the top 3% of likely exploits.
Gettyimages 1091348950

Fortinet's bid to close the cyber skills gap

Fri, 12th Apr 2019
#
firewalls
#
network infrastructure
#
network security
A comprehensive training and education strategy must include strategic partnerships within government, academia and NGOs.
Malware3

Aura Infosec discovers major Mozilla Firefox vulnerability

Wed, 10th Apr 2019
#
cybersecurity
#
chrome
#
firefox
Alex Nikolova made the discovery while conducting a research project on the same-origin policy of various web browsers.
Gettyimages 924555518

AI-driven security is no longer optional: 'It's a requirement'

Tue, 2nd Apr 2019
#
ai security
#
ai
#
cybersecurity
Artificial intelligence (AI) is increasingly seen as the key to improved cybersecurity, according to a study by BlackBerry Cylance.
Endpoint security2

BYOD can be secure with the right measures

Mon, 25th Mar 2019
#
endpoint protection
#
mfa
#
iam
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Cybersecurity3 copy

Developing APAC countries most vulnerable to malware - Microsoft

Fri, 22nd Mar 2019
#
malware
#
ransomware
#
cybersecurity
The Asia-Pacific region remains a prime target for cybercriminals, according to Microsoft's Security Intelligence Report.
Untitled design  1

How business leaders must prioritise cyber risk - Palo Alto Networks

Wed, 13th Mar 2019
#
firewalls
#
network infrastructure
#
network security
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
Cryptojacking2

IBM Security: Cybercriminals focusing on cryptojacking

Mon, 4th Mar 2019
#
ibm security
#
report
#
powershell
IBM Security's 2019 report indicates a shift in cybercriminal tactics, with cryptojacking attacks doubling those of ransomware as hackers seek easier profits.
Identity and access management

SailPoint: Identity's role in data security and compliance

Thu, 28th Feb 2019
#
iam
#
cybersecurity
#
cloud services
Simply putting a perimeter around the network cannot effectively protect all of an enterprise's users and their access to business applications and data.
Cybersecurity20

New threats on the block: Formjacking, IoT, LotL attacks

Tue, 26th Feb 2019
#
iot security
#
iot
#
iiot
Cybercriminals shift focus from ransomware to formjacking and IoT exploits, with Symantec's latest report revealing tens of millions of dollars in losses.
Photo 2

Interview: Culture and cloud - the battle for cybersecurity

Thu, 21st Feb 2019
#
malware
#
cloud security
#
cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Cybersecurity breach2

Raising the stakes: McAfee's predictions for cybersecurity

Tue, 19th Feb 2019
#
ddos
#
iot security
#
casb
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Gettyimages 825138850

Flashpoint signs on emt Distribution as APAC partner

Fri, 15th Feb 2019
#
supply chain
#
threat intelligence
#
emt distribution
Flashpoint has partnered with emt Distribution to expand its business risk intelligence services in Southeast Asia and Oceania.