Security breaches stories - Page 2
A third of security breaches are going undetected
A new survey shines a light on global misconceptions around the extent of hybrid cloud blindspots, despite predictions cloud security attacks are on the rise.
Healthcare sector proves vulnerable to data breaches
SOTI research reveals how large numbers of devices in the healthcare sector are not managed by IT departments leaving company systems vulnerable.
How Cloud-Based Print Management complements Zero Trust Architecture?
Thousands of organisations around the world are choosing uniFLOW Online to securely manage their entire print and scan environment.
Mitigating AI security risks with phishing-resistant MFA
It's undeniable that AI brings many benefits to our daily lives, but nothing prevents bad actors from leveraging AI for malicious purposes.
What do you need to do to raise your cyber resilience?
As technology becomes more complex and sophisticated, so do the threats. This is why organisations are increasingly turning to cyber insurance to manage risk.
Visibility and AI in an age plagued by security threats
Today’s world demands businesses to improve cybersecurity measures and gain greater visibility over threats and attack surfaces.
Axcient promotes Tim Sheahen to Senior Vice President of Global Sales
Axcient Promotes Tim Sheahen to SVP of Global Sales, responsible for worldwide sales and sales operations for the business availability software firm.
How to get cyber insurance – what mid-sized organisations need to know
As cyber threats continue to proliferate, mid-sized organisations are seeking cyber insurance coverage. But insurers are raising premiums.
Building a targeted operating cybersecurity model
A cyber-targeted operating model is a unique approach that provides defensibility, transparency, and accountability.
Employees unsure who to go to to report security incident
A new study shows more than 20% of the untrained global workforce do not know who to contact during a security breach.
Microsoft not addressing authentication flaw in Azure AD
Research by Secureworks has uncovered a proof-of-concept exploit of flaws in Microsoft's Azure AD PTA method that the tech giant has no plans to address.
Safeguarding your financial data
Managing data security is crucial in the digital revolution. Here are five steps towards better financial data security.
Lookout adds security offerings with SaferPass acquisition
Lookout expands security offerings with the acquisition of password management company SaferPass, aiming to provide customers with proactive protection.
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars are being invested in cybersecurity in Australia and New Zealand to combat increasing threats.
The call is coming from inside the house
Security and privacy breaches are accelerating, and the external forces we have been applying to slow the rate are hardly making an impact.
How prepared is Aotearoa for a major cybersecurity breach?
Because of the digital world we now live in, the risk of cyber attacks means that geography is no longer enough to distance ourselves from tensions overseas.
Why preventing Zero-day attacks is crucial for businesses
Indusface offers a game-changing web application firewall solution that can protect businesses from the increasing threat of Zero-day attacks.
How safe is an organisation’s data from security breaches?
Data breaches can cost businesses millions, but the real damage lies in the lasting brand and reputation harm they cause, says Infor ANZ VP Jarrod Kinchington.
The case for a new security platform based on three critical concepts
Gaining a truly integrated solution is the only way to reduce technology sprawl and consolidate an organisation’s platform.
The problem with near-misses in cybersecurity
Cybersecurity breaches in infrastructure organizations carry high potential for chaos. Proactive protection is crucial.
Cybersecurity attacks on New Zealand small business double
Cybersecurity is a growing issue for New Zealand small business, with attacks doubling in the past three years.
ATM vulnerabilities open door for attacks - report
Vulnerabilities in Wincor Cineo ATMs allow attackers to bypass encryption and make cash withdrawals, according to researchers.
94% of organisations experienced insider data breaches last year - Human error top cause
Egress survey finds a substantial 94% of organisations experienced insider data breaches in the last year, with human error the top cause.
Network security in the cloud more important than ever
SANS Institute study reveals the growth and security risks of cloud adoption in response to COVID-19 and remote work.