TechDay New Zealand - Aotearoa's technology news network

Cyber attacks stories - Page 49

Story image
HPE study delves into the underworld workings of cybercriminal economy
Mon, 23rd May 2016
#
cybersecurity
#
hpe
#
cyber attacks
New Business of Hacking report looks at adversary value chain as driving force in cybercrime and provides actionable insights.
Story image
Check Point rolls out email protection solution for Office 365 users
Wed, 18th May 2016
#
cloud services
#
email
#
zero day malware
Check Point expands SandBlast Zero-Day protection, preventing latest malware from reaching Microsoft Office 365 email customers.
Story image
John Key's $22m cyber security announcement: Industry insider opinion
Wed, 11th May 2016
#
breach prevention
#
ai security
#
ai
Key recently announced a $22 million fund to go towards setting up a national security agency - here is an industry insider opinion.
Story image
UK: Two Thirds of big business has been breached this year
Tue, 10th May 2016
#
breach prevention
#
cybersecurity
#
security breaches
The UK Government has sponsored a survey that reveals a significant fraction of businesses have been breached this year.
Story image
Majority of Aussie organisations have been breached in the past year
Mon, 9th May 2016
#
malware
#
breach prevention
#
cybersecurity
63 percent of Australian organisations have experienced at least one security breach or incident in the past year, according to a report by CompTIA.
Story image
The key to deterring cyber crims? Make an attack not worth their time
Thu, 5th May 2016
#
breach prevention
#
cybersecurity
#
data breach
Experts claim ramping up costs for hackers could be the golden ticket to deterring rampant cyber threats, urging organisations to adopt robust defences.
Story image
ALE OmniSwitches gain extra layer of security to battle modern cyber attacks
Wed, 4th May 2016
#
malware
#
partner programmes
#
cybersecurity
Today's malicious cyber environment has seen the recent technology partnership between Alcatel-Lucent Enterprise (ALE) and LGS Innovations.
Story image
Is Big Brother watching? How metadata can affect you
Wed, 4th May 2016
#
cybersecurity
#
australian government
#
akolade
It's been 5 months since the introduction of Australia's metadata laws came into effect, and the general public's understanding remains vague at best.
Story image
Cyber threats evolving at a rapid pace
Wed, 27th Apr 2016
#
casb
#
forcepoint
#
cyber attacks
Cyber threats are rapidly evolving, warns Forcepoint's Global Threat Report, with severe consequences for businesses.
Story image
How can you secure your enterprise network?
Wed, 20th Apr 2016
#
firewalls
#
network infrastructure
#
network security
Enterprises face dire cyber threats, but Fortinet's Gary Gardiner reveals a robust, layered defence is key to safeguarding network security.
Story image
How can you ensure your network is secure for digital transformation?
Tue, 19th Apr 2016
#
firewalls
#
network infrastructure
#
network security
As digital transformation takes centre stage, securing your network is paramount. Fortinet's expert advice reveals how to maintain fast, secure access.
Story image
Are cybersecurity investments wasted money?
Mon, 18th Apr 2016
#
virtualisation
#
breach prevention
#
cybersecurity
No matter how much money we throw into cybersecurity, it seems to have little impact on reducing the damage of breaches and attacks.
Story image
Unmasking cyber criminals: research unveils six cybercriminal personalities
Thu, 14th Apr 2016
#
bae systems
#
cyber attacks
#
industrial
BAE Systems spotlights six cyber criminal archetypes menacing Aussie enterprises, spotlighting a cyber underworld ahead of a key review.
Story image
Watch out, there's a new breed of cyber criminal in town
Tue, 12th Apr 2016
#
uc
#
breach prevention
#
symantec
A new class of professional cyber criminals has emerged, adopting corporate practices to increase the efficiency of their attacks.
Story image
The key challenges a business faces after an aggressive cyberattack
Wed, 6th Apr 2016
#
dr
#
cybersecurity
#
cloud services
Businesses grapple with the aftermath of cyberattacks, from operational shutdowns to data breaches, amid rising digital threats.
Story image
Mind your fitness tracker: Wearables the latest attack target
Thu, 24th Mar 2016
#
wearables
#
personal computing devices
#
ixia
Connected fitness bands, watches and wearables are becoming popular in consumer and enterprise markets; the opportunity for hackers is big business.
Story image
The next generation of APTs: Highly successful but surprisingly simple
Mon, 21st Mar 2016
#
advanced persistent threat protection
#
cybersecurity
#
cyber criminal
The number and reach of cyber threats continues to grow, and, contrary to popular belief, even highly effective attacks can be very unsophisticated.
Story image
Cyber attackers are bolder, smarter and more daring
Tue, 15th Mar 2016
#
healthtech
#
trend micro
#
cyber attacks
In a stark warning, Trend Micro's report reveals cyber threats are surging, with 2015's attacks outsmarting traditional security.
Story image
Your IT infrastructure could be taken over in just 12 minutes
Tue, 15th Mar 2016
#
it industry
#
cyberark
#
cyber attacks
The frequency and sophistication of cyber crime is growing everyday in line with the increasingly digital workplace.
Story image
Under attack? These four things will mitigate most cyber breaches
Thu, 10th Mar 2016
#
cybersecurity
#
cyber attacks
Cyberattacks are a fact of life for Australian business, but they don't have to be - here are four ways to help stop most cyber breaches.