Cybersafety stories - Page 1
ESET and Chillisoft launch MDR solution in A/NZ
The MDR service offers customers remotely delivered security operation centre capabilities, which can be used to respond to threats.
Secureworks expands EDR portfolio with two new solutions
The two new tools will give customers access to ‘comprehensive prevention, detection, and response protection across the attack surface’.
Secure your new hybrid workplace – because it’s here to stay
Identity and access management are poised to take centre stage in the next phase of corporate security revamp, writes Entrust security director for APJ James Cook.
Playing dumb no longer an option against ransomware reporting
Given the massive amounts of data enterprises hold, it may seem like an impossible task to prove what data was accessed and by whom. It isn’t.
Secure cloud migration with privileged access management
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
Video: 10 Minute IT Jams - An update from WatchGuard Technologies
WatchGuard Technologies is a cybersecurity company specialising in endpoint security, secure Wi-Fi, multi-factor authentication, and network intelligence.
Countering the rise of credential-based attacks
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
When it comes to malware, think like James Bond and trust no-one
Implementing advanced threat protection (ATP) as part of a zero trust SASE architecture is an important step in proactively blocking known and zero-day threats.
How can businesses prepare for ransomware?
To prevent attacks, organisations should apply preventive security controls that reduce the attack surface and test those controls against a ransomware attack scenario.
From ransomware to RansomOps: Why the ‘new kid on the block’ spells trouble for the unprepared enterprise
When teams have a clear view of all assets and treat them equally, then they are much closer to stopping attacks in their tracks.
Hackers have evolved since COVID-19 but have cyber-defences kept pace?
It is critical to understand how effective each security product is in stopping the new tactics that the hackers have been using since COVID-19.
Anatomy of a supply chain attack: how to accelerate incident response and threat hunting
Supply chain attacks show no sign of slowing down. But the right combination of platforms can help organisations get ahead of the threat.
OT vulnerabilities grew significantly in 2021 — report
The spike in new threats is putting vital critical infrastructure at risk, according to Skybox Security.
Ethical hacking in Aotearoa: How can it benefit cybersecurity in NZ?
Negative connotations have traditionally been applied to the term 'hacking'. But with cyber-threats ramping up, things are changing fast — and CISOs can't afford to keep the status quo.
Where should zero trust end?
With the push to zero trust, we have a rare opportunity to fix today’s pressing cybersecurity issues and build a better model of thinking about cybersecurity.
Email: Still the number one threat vector
Just as cyber-criminals are ever honing their methods to increase their chances of success, so must security teams.
Video: 10 Minute IT Jams - Mimecast exec on the threat of ransomware
In this interview, Garrett discusses the question of whether or not to pay ransoms, and explains why it's the biggest cybersecurity threat of our time.
Why phishing is a bigger threat than ransomware
Preventing today’s increasingly dynamic phishing attempts requires next-generation ‘on-device’ web security that can block phishing sites.
The network effect and the search for resilient email security
Not only is email everywhere, but it is ‘built-in’ to our lives as a required mode of communication for too many activities to name.
Video: 10 Minute IT Jams - Who is Darktrace?
Darktrace is a cybersecurity company, specialising in AI-powered cyber-defence.
Secureworks appoints Wendy Thomas as president and CEO
Thomas moves into the CEO role after serving as president of customer success. She has also held roles in finance, strategy, and product at the company.
Video: 10 Minute IT Jams - StarWind engineer on the optimal disaster recovery approach
In today's interview, StarWind solutions engineer Orest Lesyuk discusses disaster recovery, ransomware, and how StarWind's solutions stand out.
Video: 10 Minute IT Jams - Who is Tanium?
Tanium is a cybersecurity and systems management company that helps organisations manage and protect their mission-critical networks.
Seven key principles behind a robust cybersecurity practice
Here are seven critical questions that TSPs should ask of their cybersecurity practice to help protect customers.