SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Threat monitoring stories

Story image
Phishing
Barracuda adds Zero Trust Access to enhance email security
This month
The new capabilities allow customers to control access to email systems and Microsoft 365 applications on a need-to-know basis, enhancing email security.
Story image
Machine learning
How to enhance digital threat monitoring with machine learning
Last month
As part of a complete digital risk protection solution, a digital threat monitoring (DTM) solution automatically collects and analyses content streamed from external online sources.
Story image
Digital Transformation
Bitdefender unveils MSP continuous threat monitoring service
July 2022
Bitdefender has released MDR Foundations, a managed security service designed for managed service providers (MSPs) that provides continuous threat monitoring and response, intelligence-based threat hunting and elite security experts.
Story image
Data Protection
Mandiant launches digital risk protection offering
June 2022
Mandiant has launched a digital risk protection offering that allows security leaders to proactively mitigate threats before they disrupt business operations.
Story image
Cybersecurity
Could New Zealanders initiate a cyber attack from within?
May 2022
The threat landscape is significantly increasing worldwide, and the opportunities it presents are a growing concern in Aotearoa.
Story image
Malware
New vulnerabilities found in Nuspire’s Q1 2022 Threat Report
May 2022
“Threat actors are quickly adjusting their tactics and these exploits tend to get industry attention, but the threat posed by older and attacks still persists."
Story image
Endpoint detection and response
Qualys steps into future of EDR with latest release
April 2022
Qualys has launched Multi-Vector EDR 2.0 with additional threat-hunting and risk mitigation capabilities, designed to improve alert prioritisation.
Story image
Cyber Threats
IriusRisk launches OTM Standard to transform threat modelling
March 2022
The OTM Standard, released as part of version 4.1 of the IriusRisk product, is an agnostic way of describing a threat model in a simple format.
Story image
Malaysia
New roundtable series by The Malaysia Global Business Forum to discuss threat matrix in digital economy
January 2022
The Malaysia Global Business Forum (MGBF) has announced the launch of a new roundtable series titled "The Evolving Threat Matrix of the Digital Economy".
Story image
Data Protection
Barracuda launches updated email protection backed by API-based AI tech
December 2021
"Barracuda Email Protection offers customers complete protection by combining gateway defence, API-based inbox defence, incident response, data protection, and user security awareness capabilities."
Story image
Collaboration
IriusRisk's latest threat modelling platform advances collaboration and visualisation
December 2021
“This latest version of the IriusRisk platform marks a new level of maturity in the threat modelling world and will help us deliver on our ultimate objective: to make threat modelling an easily adoptable, mainstream practice."
Story image
DNS attacks
DNS attacks on the rise, organisations remain unprepared
October 2021
"The latest data indicates that organisations need to remain vigilant, close security gaps, and patrol for potential breaches around the clock.”
Story image
Cybersecurity
PwC and Palo Alto Networks partner, providing 24/7 cybersecurity defence in New Zealand
June 2021
PwC and Palo Alto Networks announce an expanded partnership strengthening cybersecurity defences for New Zealand businesses. 
Story image
Cloud Security
Trend Micro given the highest score in threat prevention report
May 2021
Independent research firm Forrester has given Trend Micro the highest possible score in threat prevention.
Story image
Breach Prevention
The three-pronged security approach that confronts security breaches head-on
October 2020
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.
Story image
Cybersecurity
Why best-practice threat data management provides confident automation
October 2020
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. 
Story image
Surveillance
A winning proposition for critical infrastructure
May 2020
When is a surveillance system more than a surveillance system? When it not only protects an organisation’s premises but also supports efficient, reliable operations, and health and safety.
Story image
Cloud
CrowdStrike launches threat-scoring platform
August 2019
CrowdScore is a metric that enables CSOs to instantly see the real-time threat level their organisations are facing, allowing them to mobilise resources to respond.
Story image
Ransomware
Don’t let fear win: saying no to ransomware
June 2019
“Agreeing to pay a ransom demand isn’t conducive to long-term security, and emboldens cyber criminals to continue to use this method.”
Story image
Intellectual property
Nearly half of all employees are willing to share business secrets
June 2019
Insider threat is real, according to a new report that highlights employee behaviour around sharing corporate information.
Story image
Cloud
SolarWinds acquires Trusted Metrics, adds threat monitoring offering for MSSPs
July 2018
The acquisition will allow SolarWinds to offer a new security software product, dubbed SolarWinds Threat Monitor.