Power / Energy
Cybersecurity stories - Page 3
NZ pours billions into IoT - so what are we doing to secure it?
"Any vulnerable device can potentially become a bot for an attacker, however, IoT devices are especially at risk because New Zealand is at a very early stage in terms of IoT maturity."
How credentials became an attacker’s easiest target
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
DDoS attacks on the rise, becoming more sophisticated
"We have seen the cryptomining and DDoS attack groups competing for resources, since many of the same botnets used for DDoS attacks can be used for cryptomining."
Be a “PAMbassador” and help your workmates be cyber smart
Right now, with the threat of ransomware and risks associated with hybrid working top of mind, there is no shortage of ways to put PAMbassadorial skills to good use!
How government agencies can deliver secure digital services to citizens
The uncertainty of the global pandemic has had an unexpected upside for New Zealand government agencies, with 83% of New Zealanders seeing their government as being generally trustworthy.
Tech infrastructure diversity holds key to better security
The spate of high profile ransomware incidents this year has halted operations across business and critical infrastructures alike.
Despite rising security budgets, businesses still paying ransom - report
The way cybercriminals use and manipulate ransomware in an effort to extract money from businesses has changed.
Cybersecurity experts weigh in on U.S govt's $10 million reward for info on DarkSide ransomware group
DarkSide was the culprit behind the ransomware attack on Colonial Pipeline, which saw the company to pay a $4.4 million ransom.
Yubico launches hardware security key with NFC & FIDO support
Yubico has updated its hardware security keys with near-field communication (NFC) technologies to support devices with NFC functionality, such as mobile phones.
Millions of police records are accidentally deleted — what are the lessons?
Data breaches are not always avoidable, but they can be mitigated if the right technology tools are applied.
Cybersecurity experts weigh in on BlackMatter ransomware shut down
Given the lucrative activity of RaaS we are likely to see them reappear in the near future. The battle against ransomware is far from over.
Video: 10 Minute IT Jams - An update from CrowdStrike
In this interview, we chat with CrowdStrike's Director of the Strategic Advisory Group for APJ, Scott Jarkoff.
Lack of security controls continues to put organisations at risk
Organisations still operate with limited visibility of user activity associated with web applications, despite the risk of insider threats and credential theft.
Attacks in phishing emails with business, IT and HR focus becoming increasingly dangerous
“Social engineering attacks continue to be one of the top ways malicious hackers breach organisations and/or cause damage."
Cybercriminals increase attacks on vulnerable retailers as global supply chain crisis worsens
“The 2021 holiday shopping season is shaping up to be a nightmare for both retailers and consumers."
A holistic approach to MDM for security and productive gains
Quality device management, from the cloud, has become paramount for ensuring business productivity and continuity.
Yubico expands YubiEnterprise Delivery Service to A/NZ
The Delivery Service is a cloud-based logistics service and allows customers to streamline YubiKey distribution to end-users.
The three horsemen of cyber risks: misinformation, disinformation, and fake news
"To deal with these cyber risks, businesses and authorities need to establish cybersecurity practices and policies that can evolve and adapt to the multifaceted cyberthreats."
NETSCOUT expands security monitoring capabilities, releases Omnis Cyber Intelligence
NETSCOUT enters the security market with 'groundbreaking' cyber intelligence technology
A surge in digital identities creating critical obstacles for businesses
One Identity has released survey findings revealing a significant increase in digital identities globally.
McAfee Enterprise & FireEye predict the cyber threats you can expect to see in 2022
As the calendar year starts to wind up, businesses must start preparing for the new year ahead.
The threat model as a compass
Just like a compass, regularly reviewing the threat model keeps the CTI teams IR’s pointed in the right direction over time.
What is NZ’s Cyber Security Emergency Response Plan?
The Cyber Security Emergency Response Plan (CSERP) is the framework that the government will use in the event of a cyber-emergency.
How businesses unknowingly leave themselves at risk
Recent cyber-events highlight the risks confronting enterprises that depend on a single vendor for their infrastructure, tools, and security.