TechDay New Zealand - Aotearoa's technology news network

Security by Design stories - Page 2

Story image
Show, don't tell: CISOs encouraged to be security 'influencers' rather than 'enforcers'
Thu, 3rd Feb 2022
#
malware
#
supply chain & logistics
#
dlp
Show, don’t tell: That’s the approach CISOs need to take if they want to better manage cybersecurity in their organisation, according to a new report from KPMG.
Story image
New year, new rules – understanding the cybersecurity danger areas in 2022
Mon, 31st Jan 2022
#
iot security
#
supply chain & logistics
#
cybersecurity
The World Economic Forum's Global Risks Report 2022 revealed cybersecurity as the biggest worry for Australian business leaders in 2022.
Story image
Be a “PAMbassador” and help your workmates be cyber smart
Tue, 9th Nov 2021
#
pam
#
cybersecurity
#
thycotic
If you are an IT or cybersecurity professional with PAM experience, being a PAMbassador could benefit both your organization and your career.
Story image
CISOs need to step up against cyber threats, report finds
Fri, 10th Sep 2021
#
advanced persistent threat protection
#
cso / ciso
#
ey
Oceania's CISOs face unprecedented concerns, with over half feeling unprepared against cyber threats amid budget constraints, an EY report reveals.
Story image
Visual development tools present real opportunity for ANZ businesses
Tue, 1st Dec 2020
#
devops
#
application security
#
devsecops
Nearly one-quarter of businesses in Australia and New Zealand plan to adopt visual development tools in the next 18 months, according to a study by IDC.
Story image
GitHub's code vulnerability scanning tool now generally available
Fri, 16th Oct 2020
#
martech
#
application security
#
apm
GitHub has recently rolled out code scanning to help developers detect and prevent vulnerabilities from popping up in their open source and enterprise code.
Story image
A security by design approach for cybersecurity
Tue, 9th Jun 2020
#
advanced persistent threat protection
#
risk & compliance
#
cybersecurity
Your website faces attacks from nefarious elements with financial gain and industrial sabotage high on their list of motivations.
Story image
Successful cloud transformation requires collaboration on network strategy
Fri, 13th Dec 2019
#
firewalls
#
network infrastructure
#
digital transformation
An organisation’s security team must be invited to the table when a transformation project is in the early planning stages, Zscaler says.
Story image
Google & Dell launch Chromebooks for the enterprise
Wed, 28th Aug 2019
#
network infrastructure
#
personal computing devices
#
google
Google is releasing a new series of Chromebooks tailored to the enterprise, thanks to a partnership with Dell.
Story image
IoT home connectivity on the up, as are cybersecurity threats
Thu, 18th Jul 2019
#
iot
#
smart home
#
cybersecurity
Nearly 50% of homes in Oceania have IoT devices, but this growing trend also increases security risks, according to a study by Stanford University and Avast.
Story image
Interview: Uber's CISO reveals lessons learned from breaches
Mon, 8th Apr 2019
#
breach prevention
#
risk & compliance
#
cybersecurity
Uber’s chief information security officer John ‘Four’ Flynn has a career history that many technologists could only dream of.
Story image
Sphere Identity launches self-sovereign identity platform
Tue, 2nd Apr 2019
#
iam
#
risk & compliance
#
sphere identity
Sphere Identity unveils a cutting-edge platform and app enabling businesses to comply with KYC and GDPR, while giving users seamless control over their data.
Story image
The quid pro quo in the IoT age
Tue, 13th Nov 2018
#
iot
#
iam
#
healthtech
As the digital economy booms, consumer data swaps for benefits drive IoT; however, security gaps prompt calls for robust protections.
Story image
Exclusive: Aura on designing a secure IT infrastructure
Mon, 17th Sep 2018
#
application security
#
devsecops
#
aura information security
Aura's Michael Warnock discusses building secure IT systems from inception to combat the rising threat of cyber attacks, stressing ongoing robust defences.
Story image
Interview: MuleSoft discusses the security risks in IoT
Thu, 26th Jul 2018
#
mulesoft
#
security by design
#
partners
IoT's rise poses grave security risks; enterprises seek secure integration and API-led strategies, experts say.
Story image
Singapore IMDA launches GoSecure cybersecurity programme for Singapore ICT firms
Wed, 23rd May 2018
#
devops
#
apm
#
cybersecurity
Singapore's IMDA launches the GoSecure programme, collaborating with SIT to enhance the cybersecurity of 200 ICT firms from July 2018 to July 2020.
Story image
Interview: CyberArk tells why DevOps must adopt 'secure innovation by the numbers'
Mon, 14th May 2018
#
devops
#
application security
#
devsecops
Elizabeth Lawler is CyberArk’s vice president of DevOps Security. She says the DevOps train is unstoppable, but security needs to be more prominent.
Story image
IoT device security is a business responsibility, too
Wed, 9th May 2018
#
malware
#
firewalls
#
network infrastructure
Despite their potential, IoT devices often lack proper security measures, posing significant risks for businesses. ESET emphasises a proactive approach.
Story image
2.5 billion data records exposed - most from human error
Thu, 12th Apr 2018
#
encryption
#
breach prevention
#
cybersecurity
In 2017, 2.6 billion data records were exposed, mainly due to human error, marking a staggering 580% increase since 2016, Gemalto reports.
Story image
Expert says thriving IoT security market “shouldn’t surprise anyone”
Thu, 22nd Mar 2018
#
iot security
#
iot
#
cybersecurity
After Gartner forecast IoT security spending to hit US$3.1b in 2021, Huntsman's Piers Wilson says IoT vulnerabilities are being found all the time.