Gen supports cyber safety for small businesses through the Avast business portfolio
The Gen portfolio of solutions for small businesses will help small businesses and scale to stay ahead of the latest cyber threats.
Avast One extends protection with Online Safety Score
Avast One has extended its cross-platform support by adding its Online Safety Score feature to both the Mac and iOS platforms of Avast One.
Malwarebytes expands Nebula platform with DNS module
Malwarebytes expands Nebula platform with DNS filtering module, providing Zero Trust offering and blocking access to malicious websites.
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy.
Zoom puts greater focus on the platform's security and privacy
Zoom has recently received a variety of third-party certifications, unveiled product innovations, and established programs, focusing on security and privacy.
TikTok's unveils plans to safeguard and diversify recommendations
TikTok has unveiled new details about the platform's work to safeguard and diversify its recommendation system.
Why the biggest cyber-attacks go undetected
Data breaches and cyber-attacks are not as quick and exciting as portrayed on screen. In reality, they unfold over months and require correlation to detect.
Waikato DHB warned a cyberattack 'catastrophic for patient safety'
Waikato DHB was warned its IT security was severely compromised months before a massive ransomware attack that brought Waikato Hospital to its knees.
How credentials became an attacker’s easiest target
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
The threat model as a compass
Just like a compass, regularly reviewing the threat model keeps the CTI teams IR’s pointed in the right direction over time.
How businesses unknowingly leave themselves at risk
Recent cyber-events highlight the risks confronting enterprises that depend on a single vendor for their infrastructure, tools, and security.
Zero trust in NZ, and its rise from fringe approach to industry standard
Cybersecurity has transformed in the last 18 months, with the zero trust model becoming the industry standard, according to a report.
The rising importance of mainframe security
Mainframe-reliant organisations in Australia and New Zealand must implement multifactor authentication to protect against cyberthreats.
How an intelligence-driven approach can close the XDR gap
Extended detection and response (XDR) has become the white-hot name in the security world, writes Anomali senior VP and GM Stree Naidu.
NZ organisations see cybersecurity boost as TechnologyOne upgrades platform
The company has completed a ‘significant architectural redesign’ of its security in collaboration with Amazon Web Services (AWS).
Video: 10 Minute IT Jams - BeyondTrust CTO discusses common attack vectors in 2021
BeyondTrust's CTO, Marc Maiffret, discusses the recently released BeyondTrust Malware Threat Report 2021 in a TechDay interview.
Technology, not training, protects users from phishing
Businesses should prioritise utilisation of readily available authentication technologies to prevent the ongoing phishing threat.
ESET and Chillisoft launch MDR solution in ANZ
The MDR service offers customers remotely delivered security operation centre capabilities, which can be used to respond to threats.
Secureworks expands EDR portfolio with two new solutions
The two new tools will give customers access to ‘comprehensive prevention, detection, and response protection across the attack surface’.
Secure your new hybrid workplace – because it’s here to stay
The hybrid workplace model is here to stay as companies embrace remote work. Digital identity and security are key considerations for success.
Playing dumb no longer an option against ransomware reporting
Given the massive amounts of data enterprises hold, it may seem like an impossible task to prove what data was accessed and by whom. It isn’t.
Secure cloud migration with privileged access management
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
Video: 10 Minute IT Jams - An update from WatchGuard Technologies
WatchGuard Technologies is a cybersecurity company specialising in endpoint security, secure Wi-Fi, multi-factor authentication, and network intelligence.
Countering the rise of credential-based attacks
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.