ChannelLife Australia logo
Industry insider news for Australia's technology resellers

Cybersafety news stories - Page 2

Story image
Cybersecurity
Anatomy of a supply chain attack: how to accelerate incident response and threat hunting
Supply chain attacks show no sign of slowing down. But the right combination of platforms can help organisations get ahead of the threat. 
Story image
Operational technology
OT vulnerabilities grew significantly in 2021 — report
The spike in new threats is putting vital critical infrastructure at risk, according to Skybox Security.
Story image
Cybersecurity
Ethical hacking in Aotearoa: How can it benefit cybersecurity in NZ?
Negative connotations have traditionally been applied to the term 'hacking'. But with cyber-threats ramping up, things are changing fast — and CISOs can't afford to keep the status quo.
Story image
Zero trust
Where should zero trust end?
With the push to zero trust, we have a rare opportunity to fix today’s pressing cybersecurity issues and build a better model of thinking about cybersecurity.
Story image
Cybersecurity
Email: Still the number one threat vector
Just as cyber-criminals are ever honing their methods to increase their chances of success, so must security teams.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - Mimecast exec on the threat of ransomware
In this interview, Garrett discusses the question of whether or not to pay ransoms, and explains why it's the biggest cybersecurity threat of our time.
Story image
Phishing
Why phishing is a bigger threat than ransomware
Preventing today’s increasingly dynamic phishing attempts requires next-generation ‘on-device’ web security that can block phishing sites.
Story image
Email
The network effect and the search for resilient email security
Not only is email everywhere, but it is ‘built-in’ to our lives as a required mode of communication for too many activities to name.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - Who is Darktrace?
Darktrace is a cybersecurity company, specialising in AI-powered cyber-defence.
Story image
Cybersecurity
Secureworks appoints Wendy Thomas as president and CEO
Thomas moves into the CEO role after serving as president of customer success. She has also held roles in finance, strategy, and product at the company.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - StarWind engineer on the optimal disaster recovery approach
In today's interview, StarWind solutions engineer Orest Lesyuk discusses disaster recovery, ransomware, and how StarWind's solutions stand out.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - Who is Tanium?
Tanium is a cybersecurity and systems management company that helps organisations manage and protect their mission-critical networks.
Story image
Cybersecurity
Seven key principles behind a robust cybersecurity practice
Here are seven critical questions that TSPs should ask of their cybersecurity practice to help protect customers.
Story image
Cybersecurity
HackerOne unveils sweeping product expansion, including vulnerability ranking table
“We’re looking forward to seeing how customers use the valuable data provided by our hackers to inform security programs within their organisations.”
Story image
Cloud Security
The three Rs of visibility for any cloud journey
Network-based telemetry is an essential component in securing the move to the cloud, writes Gigamon CTO Shehzad Merchant.
Story image
Cybersecurity
How Self-Learning AI is changing the paradigm of endpoint security
Self-Learning AI is set to change the game for endpoint security – detecting the novel and sophisticated attacks that cause so much disruption today. 
Story image
Cybersecurity
The importance of securing cloud deployments with the right services
It’s important to choose a partner that can recommend fit-for-purpose solutions developed specifically for the organisation’s unique requirements.
Story image
Cybersecurity
Ransomware shows why we need a bipartisan federal cybersecurity policy
Ransomware is the wake-up call, but the main event is quantum computing. We need to be ready, writes Senetas CEO and Votiro director Andrew Wilson.
Story image
Digital Credentials
Attivo Networks launches credential-cloaking tool to deter data thieves
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
Story image
Secure access service edge / SASE
What to know when considering zero trust digital transformation
The security landscape is constantly changing, but SASE can help organisations tackle countless security challenges.
Story image
Cybersecurity
Wake-up call required to defend APAC’s critical national infrastructure
Cyber-attacks across the Asia Pacific region have grown in sophistication and prevalence, and require effective incident response mechanisms to combat them.
Story image
Remote Working
Vodafone NZ launches new remote working security tool
Partnering with Palo Alto Networks, the solution uses advanced threat protection technology to safeguard users and ensures a secure remote working environment.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - Who is Exabeam?
Exabeam is cybersecurity and analytics solution provider, specialising in threat detection, investigation, and response (TDIR).
Story image
Cybersecurity
What makes a security analyst successful? Investigative thinking
Empowering humans to engage in critical thinking is vital to efficient detection and response, writes ThreatQuotient APJC regional director Anthony Stitt.