Business Intelligence / BI
Digital Transformation / DX
Cybersecurity stories - Page 1
Help desk responsibilities increase with advances in AI, cybersecurity, remote working, and cloud computing
CompTIA finds help desk responsibilities are broadening as AI, cybersecurity, remote working, and cloud computing becoming more prevalent.
Rapid device adoption reveals massive security gaps across BYOD initiatives
Organisations are ill-equipped to deal with growing security threats such as malware and data theft.
Warning: Fancy Lazarus DDoS extortion group resurfaces
"This is the first time we are seeing the bad actors selectively target organisations and favour those with unprotected assets for their ransom letters."
IDC names APAC Leaders in cloud security services sector
Seven vendors were designated Leaders in the space, with IDC noting that these providers demonstrated leadership in the provision of cloud-native security.
New wave of Fancy Lazarus DDoS extortion campaigns identified by Link11
A new wave of DDoS extortion campaigns by Fancy Lazarus has been identified by Link11.
Tech, finance sectors top targets for cyber attacks
"If threat actors can successfully compromise just one of these companies' systems, it can create a ripple effect that will impact large groups of organisations across industries and geographies."
Video: 10 Minute IT Jams - Bitglass director on the relationship between security and digital transformation
Jonathan Andresen, back for his third IT Jam, speaks about how cybersecurity fits into discussions and processes about digital transformation.
New plug-and-play edge product connects IoT devices and legacy infrastructures
Edge company Byos has launched a plug-and-play edge security product designed to provide secure connectivity for IoT devices and legacy infrastructures.
Growth in online investing highlights cybersecurity risks
A digital revolution is transforming the investment scene, but throwing up issues of security.
Why zero trust must form a key pillar of any cybersecurity strategy
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.
Over a third of workers have picked up bad cybersecurity habits while working remotely
A new report finds over a third of workers have picked up bad cybersecurity behaviours since working from home.
The rise of cybercrime and NZ's fragmented response
Cybercrime is on the rise but New Zealand's response to it is fragmented and victims rarely get justice. In the wake of the Waikato District Health Board ransomware attack, Anusha Bradley asks how we can better help and protect cybercrime victims.
Dealing with cyber criminals: Some NZ businesses 'feel they have no choice but to pay'
An increasing number of New Zealand businesses are paying ransoms to cyber criminals.
Kaspersky's VR simulation game allows executives to work as IT security specialists
Kaspersky has created a VR game where executives can work as information security specialists, giving them a better understanding of cybersecurity.
Money to be made: Ransomware attacks on the rise
Attacks are continuing to accelerate because they are extremely lucrative for attackers.
Trickbot takes over from Dridex as most prevalent malware
Established Dridex trojan has dropped off altogether after being one of the most popular malwares in recent months amidst a global surge in ransomware.
How organisations can protect their print privacy in a digital world
Learning how to better protect the data used and stored by organisations’ print systems is in their best interests for the company’s future success.
ExtraHop acquired by Bain Capital and Crosspoint Capital for US$900M
"ExtraHop brings a unique level of visibility into networks and delivers sophisticated real-time detection, investigation, and response capabilities to organisations around the world."
Aus Government must support ICT industry as skills shortages continue
The possibilities of innovative technologies are not being fully realised by Australia's Government, and this is adversely impacting the economy, the latest AIIA survey finds.
How to recover from a ransomware attack faster and return to business acceleration
When an organisation can recover quickly from a ransomware attack, organisations can accelerate growth safely and reliably.
Proactively mitigate cyber risk with MISP and TheHive
When an attack happens, security teams should be ready with information about who is attacking and the steps being taken to mitigate damage.
Surge in Android banking malware and RDP attacks - ESET
A new report from cybersecurity firm ESET has revealed rapid abuse of trending vulnerabilities and configuration flaws by cyber crooks.
Sophos unearths involvement of Lemon Duck crypto-mining malware in ProxyLogon attacks
The Lemon Duck cryptomining malware is being used to target unpatched Microsoft Exchange servers —giving it a 'firm foothold' in compromised servers.
Prisma Cloud updates help to fight alert fatigue
Palo Alto Networks has launched updates to Prisma Cloud, the company’s cloud security posture management (CSPM) solution.