The latest in entrepreneurial technology news for Kiwis
These search results are from across the Techday network of sites
North Korea's threat actors operating from other countries
North Korea conducts malicious cyber operations from countries including India, Malaysia, New Zealand, Nepal, Kenya, Mozambique, Indonesia, and China.
Cryptominers posing a new threat for enterprise IT infrastructures
As well as viruses, trojans, worms and ransomware attacks, IT managers now have a new threat to worry about: cryptominers.
Victorian Govt devotes $17.6 m to Cyber Security Strategy
The strategy will protect government agencies and networks from cyber hacking threats, and will also help to protect the privacy of Victorians.
34 tech heavyweights stand strong: Protecting the globe from cyber threats
Not only with the companies protect customers, they've also vowed not to help governments who want to go on the cyber offensive.
You’re invited: Sydney’s 2nd Annual Safety, Security and Counter-Terrorism Forum
The security of Australia’s borders, economy and the safety of our people have never been more important.
Malicious 'bad bots' account for more web traffic than ever before
4% of bad bot traffic is made up of moderate or sophisticated bots, which evade detection by distributing their attacks over multiple IP addresses.
Kiwi SMBs strengthen their cyber defences as threats rise
Results from the survey found that 89% of SMBs have signed up for security solutions to protect against threats.
E-commerce requires beefed up cybersecurity to function well
In an increasingly interconnected world, online shopping and electronic transactions have now transcended its innovation status.
Three key elements to protect Kiwi enterprises from cyber threats
Executive teams must invest in continually improving security management processes to prevent successful attacks.
Cybersecurity Advisors Network appoints Sydney-based APAC representative
Peter Coroneos will now lead the Cybersecurity Advisors Network (CyAN) efforts across Asia Pacific. He is based in Sydney.
CrowdStrike compiles 'casebook' of cybersecurity's important lessons
The casebook found that attack trends towards fileless malware, such as those that execute code from memory, made up 66% of all attacks.
Interview: Hivint's cofounder on Security Colony & the power of the hive approach
Hivint and Security Colony’s Nick Ellsmore on the future of solution sharing in cybersecurity.
Half of IT executives want to detect in-progress attacks before it's too late
Almost half of IT executives want to detect an attack in progress while there’s still time to act.
How to drop complexity and move to a more efficient security strategy
"The idea that a security team, on its own, can prevent any attack is getting harder to put into action."
Enterprise concerns driving Australian information security spend to $2.8b
Australian information security spend is expected to climb to $2.8b this year, with enterprise security services a key market.
Comodo opens up threat library to public – almost 100m incidents in Q217 alone
Comodo has opened its ‘library’ to university, governmental, and non-profit educators and researchers in an industry-first.
Palo Alto Networks & INTERPOL finalise major threat-sharing intelligence agreement
Palo Alto Networks will soon be the first cybersecurity company in the world to sign a Data Exchange Agreement with INTERPOL.
Isolation no excuse: NZ must change its risk management approach to survive the future
“What works best are collaborative approaches across supply chains, businesses and public-private partnership. NZ seems to have a long way to go."
Human-machine teaming a key ingredient for success in security operations centres
71% of advanced SOCs were able to close breach incident investigations in less than a week. 37% closed investigations in fewer than 24 hours.
Fortinet's top tips for cultivating situational awareness of cyber threats
"If people could become more situationally aware in their handling of computing devices, they would be victimised by cyber theats much less often."
Why User Behaviour Analytics are the secret weapon in your security strategy
UBA is valuable for detecting user access anomalies. If there are multiple VPN sessions from a foreign country at 2am, alarm bells should be ringing.
The time is now - Secure your organisation from threats you can and can't see
There are two types of companies; Those that have been hacked, and those who don’t know they have been hacked.
Check Point joins Cyber Threat Alliance alongside global security heavyweights
Check Point is the sixth member in the global Cyber Threat Alliance (CTA), alongside Cisco, Fortinet, Intel Security, Palo Alto Networks and Symantec.
Opportunistic cyber attacks most dangerous, says SecureWorks report
“In essence, the industry has not served the best interests of the organisations it promised to protect."