CFOtech New Zealand - Technology news for CFOs & financial decision-makers

Cybersecurity strategy stories - Page 6

Cybersecurity24

Fortune 500 companies failing to demonstrate cybersecurity commitment - Bitglass

Thu, 3rd Oct 2019
#
casb
#
report
#
bitglass
A Bitglass report reveals that 77% of Fortune 500 companies lack transparency in cybersecurity roles, with just 62% having a Chief Information Security Officer.
Markperry

Why businesses need a strategy to combat the enemy within – Ping Identity

Wed, 18th Sep 2019
#
risk & compliance
#
ping identity
#
opinion
While strengthening your organisation's external defences with the latest tools and technologies makes sound sense, it's only half a battle plan.
Sinclair1

Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard

Tue, 17th Sep 2019
#
firewalls
#
network infrastructure
#
network security
Enterprises looking to reduce the risk of cyber-compromise or attack need to think about adding multi-factor authentication technology to their arsenal.
Cybersecurity26

Board members in ANZ most engaged in cybersecurity – Infosys

Tue, 10th Sep 2019
#
document management
#
ecm
#
martech
The research highlights how cybersecurity is a top priority for organisations in the ANZ market, with boards taking a more hands-on approach to cybersecurity.
Gettyimages 1137788912

Govt invests $8m into refreshed Cyber Security Strategy

Tue, 2nd Jul 2019
#
new zealand government
#
cybersecurity strategy
#
cert
The Government has refreshed its approach to New Zealand's cybersecurity, with more focus on partnerships, funding, and international participation.
Remote worker2

Security risks of neglecting the workforce experience – Avaya

Fri, 28th Jun 2019
#
avaya
#
opinion
#
cybersecurity strategy
Government departments and enterprises are wasting millions of dollars every year on cybersecurity because they fail to also invest in the user experience.
Screen shot 2019 05 16 at 10

General staff don't get tech jargon - expert says time to ditch it

Thu, 16th May 2019
#
phishing
#
email security
#
cybersecurity
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
Cyber warfare

Security professionals want to return fire – Venafi

Wed, 20th Mar 2019
#
devops
#
apm
#
software development
Seventy-two percent of professionals surveyed believe nation-states have the right to 'hack back' cybercriminals.
Untitled design  1

How business leaders must prioritise cyber risk - Palo Alto Networks

Wed, 13th Mar 2019
#
firewalls
#
network infrastructure
#
network security
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
Big data1

Flashpoint: Contextual data key to effective security

Mon, 4th Feb 2019
#
data analytics
#
martech
#
planning
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.
Telecomms3

Achieving cyber resilience in the telco industry - Accenture

Mon, 21st Jan 2019
#
uc
#
ddos
#
devops
With hacking attempts surging, Singtel, SoftBank, Etisalat, and Telefónica have formed the Global Telco Security Alliance to bolster global cybersecurity.
Cloud10

Implementing shared security models in the cloud

Tue, 8th Jan 2019
#
firewalls
#
cloud security
#
application security
Developers aren't usually aware of every control that should be implemented to ensure security in cloud environments.
Cyber attack   global

How protecting critical infrastructure starts with securing social media

Tue, 1st Jan 2019
#
iam
#
cybersecurity
#
passwords
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Thinkstockphotos 929002810

How to configure your firewall for maximum effectiveness

Wed, 14th Nov 2018
#
manageengine
#
opinion
#
cybersecurity strategy
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Cyber attacker2

Companies swamped by critical vulnerabilities – Tenable

Fri, 9th Nov 2018
#
report
#
cybersecurity strategy
#
tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Unified coms

Don't let your network outgrow your IT team

Thu, 8th Nov 2018
#
network infrastructure
#
sdn
#
naas
Growing complexity in business networks can overwhelm IT teams. Pruning back complexity and increasing visibility can help IT teams stay in control.
Cyber attack   global

Combatting the rise of Cybercrime-as-a-Service

Wed, 7th Nov 2018
#
malware
#
breach prevention
#
wireless networks
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people's identities, and more.
Cloud security4

Securing your cloud data: Point solutions vs single pane of glass

Mon, 5th Nov 2018
#
edutech
#
cloud security
#
casb
Organisations that can use fewer security products that individually offer more capability are likely to have a lower total cost of ownership.
Cybersecurity9

The key pillars of strong cybersecurity strategies

Fri, 2nd Nov 2018
#
devops
#
multi-cloud
#
iam
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.
Cybersecurity breach2

LogRhythm reports higher-than-anticipated SOAR adoption rate

Thu, 1st Nov 2018
#
siem
#
logrhythm
#
cybersecurity strategy
LogRhythm sees a significant surge as 33% of customers adopt its SOAR capabilities, outpacing Gartner's 2018 SOAR adoption estimates.