Techday Network
Sign in
Sign up
The grand central station for Kiwi technology news
Results:
Lew Kai Ping
These search results are from across the Techday network of sites
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Report finds GCSB in compliance with NZ rights
The Inspector-General has given the GCSB its compliance tick of approval for the fourth year in a row.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
DanaBot banking Trojan: How to protect your organisation
DanaBot is a Trojan written in the Delphi programming language that includes banking site web injections and stealer functions.
Ping Identity announces new Identity-as-a-Service solution
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.
Singtel integrates cybersecurity capabilities under Trustwave banner
The integration enables Trustwave to harness the synergies of Singtel’s global cybersecurity business, revenue, capabilities across the Americas, Europe and Asia Pacific.
Why encryption causes DDoS defence headaches
Some forms of encryption technology can make identifying and blocking some threats more difficult.
ForgeRock updates multicloud identity management solution
Organisations today need to maintain an identity platform that enables both friction-free and highly-secure authentication.
Carbon Black adds MITRE ATT&CK feeds to security products
The new threat feeds map directly to the various attack tactics outlined by MITRE.
500 million impacted by Marriott database breach
A root cause of the breach is currently unknown, but Marriott indicated that the intruders encrypted the information before exfiltrating the data.
Why a data protection mindset needs to be in your cyber agenda
Businesses’ access to and reliance on data means the risk of data loss are higher than they've ever been.
Govt announces cybersecurity grants for SMBs
Over the next two years, eligible small businesses can apply for individual grants of up to $2,100.
Gartner names Zscaler leader in secure web gateways
“The market for cloud-based secure web gateway (SWG) services continues to grow more quickly than the market for appliance-based SWGs.”
AWS makes building and securing data lakes easier
AWS Control Tower, AWS Security Hub, and AWS Lake Formation help with provisioning and governance, monitoring security and compliance, and building and managing data lakes.
FBI disrupts multiple botnets as part of anti-fraud operation
Ad fraud ring 3eve used botnets to generate nearly 30 million dollars in fraudulent ad revenue.
« First
‹ Prev
1
2
3
4
5
6
…
Next ›
Last »