Techday Network
Sign in Sign up
Techday New Zealand logo
The grand central station for Kiwi technology news

Results:

Lew Kai Ping

These search results are from across the Techday network of sites
Story image
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
10 Dec 18
Story image
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
10 Dec 18
Story image
Report finds GCSB in compliance with NZ rights
The Inspector-General has given the GCSB its compliance tick of approval for the fourth year in a row.
10 Dec 18
Story image
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
10 Dec 18
Story image
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
07 Dec 18
Story image
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
07 Dec 18
Story image
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
07 Dec 18
Story image
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
06 Dec 18
Story image
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
06 Dec 18
Story image
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.
06 Dec 18
Story image
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
06 Dec 18
Story image
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
05 Dec 18
Story image
DanaBot banking Trojan: How to protect your organisation
DanaBot is a Trojan written in the Delphi programming language that includes banking site web injections and stealer functions.
05 Dec 18
Story image
Ping Identity announces new Identity-as-a-Service solution
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.
05 Dec 18
Story image
Singtel integrates cybersecurity capabilities under Trustwave banner
The integration enables Trustwave to harness the synergies of Singtel’s global cybersecurity business, revenue, capabilities across the Americas, Europe and Asia Pacific.
05 Dec 18
Story image
Why encryption causes DDoS defence headaches
Some forms of encryption technology can make identifying and blocking some threats more difficult.
04 Dec 18
Story image
ForgeRock updates multicloud identity management solution
Organisations today need to maintain an identity platform that enables both friction-free and highly-secure authentication.
04 Dec 18
Story image
Carbon Black adds MITRE ATT&CK feeds to security products
The new threat feeds map directly to the various attack tactics outlined by MITRE.

04 Dec 18
Story image
500 million impacted by Marriott database breach
A root cause of the breach is currently unknown, but Marriott indicated that the intruders encrypted the information before exfiltrating the data. 
03 Dec 18
Story image
Why a data protection mindset needs to be in your cyber agenda
Businesses’ access to and reliance on data means the risk of data loss are higher than they've ever been.
03 Dec 18
Story image
Govt announces cybersecurity grants for SMBs
Over the next two years, eligible small businesses can apply for individual grants of up to $2,100.
03 Dec 18
Story image
Gartner names Zscaler leader in secure web gateways
“The market for cloud-based secure web gateway (SWG) services continues to grow more quickly than the market for appliance-based SWGs.”
03 Dec 18
Story image
AWS makes building and securing data lakes easier
AWS Control Tower, AWS Security Hub, and AWS Lake Formation help with provisioning and governance, monitoring security and compliance, and building and managing data lakes.
30 Nov 18
Story image
FBI disrupts multiple botnets as part of anti-fraud operation
Ad fraud ring 3eve used botnets to generate nearly 30 million dollars in fraudulent ad revenue.
29 Nov 18
  • « First
  • ‹ Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • Next ›
  • Last »
Techday New Zealand logo
The grand central station for Kiwi technology news
Social
  • LinkedIn
  • Twitter
  • Facebook
  • RSS
About us
  • Our sites
  • Advertise
  • Our team
  • Our terms
  • Contact us
  • kiwi sites
  • SecurityBrief
  • ChannelLife
  • bizEDGE
  • FutureFive
  • IT Brief
Powered by
Techday logo
© 2018 Techday Ltd, All rights reserved. Dedicated Servers powered by HD