Threat Landscape stories - Page 82
Cybersecurity arms race to escalate in 2016
Tue, 27th Oct 2015
#
ddos
#
iam
#
cybersecurity
Spending on cybersecurity protection is set to exceed $37 billion, as organisations increase spending to keep their businesses, data, and users safe.
FireEye and F5 partner up to help CISOs
Wed, 7th Oct 2015
#
ddos
#
breach prevention
#
cybersecurity
FireEye and F5 Networks unite to bolster the cyber defence of Asia Pacific enterprises, merging advanced threat protection with robust application delivery.
Organisations unprepared for the greatest security risks, survey finds
Fri, 2nd Oct 2015
#
breach prevention
#
cyberark
#
cyber attacks
Cyber attackers posing as legitimate insiders represent the greatest security risks to organisations, according to a new survey by CyberArk.
Are you prepared for today's sophisticated cyber threats?
Tue, 29th Sep 2015
#
edutech
#
data protection
#
data analytics
With the threat landscape has fundamentally changing, it's more important than ever for businesses to educate their employees.
Fujitsu joins LogRhythm MSSP program
Thu, 10th Sep 2015
#
siem
#
fujitsu
#
logrhythm
Fujitsu signs on as LogRhythm managed security services partner to expand its delivery of compliance automation and assurance.
Are you prepared for 'living off the land' attacks?
Wed, 9th Sep 2015
#
malware
#
network infrastructure
#
cybersecurity
Organisations, particularly those that are housing valuable or sensitive information, need to be on alert for threats that use little to no malware.
Don't let cybercriminals hold your business hostage
Mon, 31st Aug 2015
#
malware
#
ransomware
#
ai security
Ransomware attacks are set to continue as cybercriminals find profitable business model, says Webroot Threat Research.
Virtual infrastructure recovery costing businesses
Tue, 25th Aug 2015
#
risk & compliance
#
kaspersky
#
virtual infrastructure
The cost of recovering from a cyber attack is twice as much for businesses with virtual infrastructure, says Kaspersky Lab.
Tenable signs Datacom TSS; pushes continuous scanning
Mon, 24th Aug 2015
#
datacom
#
tenable
#
partners
Tenable Network Security appoints Datacom TSS as a key Kiwi partner; pushes for continuous vulnerability monitoring.
Malware and malicious apps increasing in NZ
Wed, 19th Aug 2015
#
malware
#
endpoint protection
#
edr
Malware detections and the number of malicious app downloads by mobile device users in New Zealand increased in the second quarter of 2015.
Mobile threat landscape a minefield
Wed, 5th Aug 2015
#
uc
#
cybersecurity
#
apps
Mobile app vulnerabilities and threat vectors are on the rise, posing risks to enterprise security, according to a new report.
Time-to-detection key to prevent sophisticated cyberattacks
Mon, 3rd Aug 2015
#
martech
#
supply chain
#
cybersecurity
Organisations must reduce the time to detection to remediate against sophisticated cyber attacks, according to new findings from Cisco.
Imperva garners sole 'leader' rank in WAF Magic Quadrant
Mon, 27th Jul 2015
#
firewalls
#
ddos
#
network infrastructure
Imperva has been named the sole leader in Gartner's Magic Quadrant for web application firewalls, garnering the top spot for two years running.
Security top concern - and top investment priority
Wed, 24th Jun 2015
#
dlp
#
risk & compliance
#
cybersecurity
Security is not only the top CIO concern across all areas of third platform technology in Australia - it's also top priority for investment says IDC.
Financial organisations increasingly vulnerable to cyber attacks
Tue, 23rd Jun 2015
#
risk & compliance
#
cybersecurity
#
bae systems
UK banks at higher cyber threat, lags in safeguarding against sophisticated financial crimes, says BAE expert.
Organisations are severely lacking in cybersecurity maturity
Tue, 16th Jun 2015
#
edutech
#
uc
#
cybersecurity
Overall, organisations are displaying a lack of maturity and an over reliance on prevention when it comes to cybersecurity, according to EMC.
SMX lauches email security service for Office 365
Fri, 12th Jun 2015
#
malware
#
email security
#
cybersecurity
SMX has launched a new offering designed to make it easy for resellers and customers to integrate SMX email filtering with Office 365.
Wireless networks major security weakness for enterprises
Wed, 3rd Jun 2015
#
firewalls
#
network infrastructure
#
network security
Wireless network security is causing sleepless nights for CIOs and IT managers, with many 'fessing up that their networks are, in fact, insecure.
Intelligence-led testing imperative for security
Fri, 29th May 2015
#
cybersecurity
#
bae systems
#
bank of england
The evolving cyber threat landscape is leading to a real need of more robust defences, as well as realistic, or 'real-life' testing of those defences.
State of the internet: DDoS attack activity soaring
Wed, 20th May 2015
#
ddos
#
akamai
#
threat landscape
Akamai's latest data reveals a doubling of DDoS attacks in Q1 2015, with the focus shifting to less massive but longer attacks.