Threat intelligence stories - Page 21

CSA strikes another partnership to strengthen Singapore's threat intelligence
Fri, 20th Jul 2018
#
fintech
#
threat intelligence
#
cyber security agency of singapore
Singapore's Cyber Security Agency and Financial Services Information Sharing and Analysis Centre have signed a MoU to improve cooperation on cybersecurity.

Adopt a cyber attacker’s point of view to protect data
Thu, 28th Jun 2018
#
breach prevention
#
isaca
#
threat intelligence
The ISACA and SecurityScorecard paper provides 11 key questions to ask to implement continuous assurance related to threat understanding.

Domain Name Commission & CERT NZ to share information about .nz cyber threats
Thu, 14th Jun 2018
#
cybersecurity
#
domain name commission
#
threat intelligence
The two agencies have agreed to share certain domain registration information so that they can ‘enhance’ cybersecurity in New Zealand.

Interview: RSA Security decodes digital fraud and its effects on APAC
Tue, 5th Jun 2018
#
cryptocurrency
#
fintech
#
blockchain
Digital fraud in APAC is rising as online threats evolve. RSA Security’s Richard Booth highlights key risks and strategies to stay protected.

GCSB expands 'Malware-Free Networks' initiative after successful pilot with Vodafone
Mon, 28th May 2018
#
malware
#
advanced persistent threat protection
#
cybersecurity
The Malware-Free Networks initiative was developed as part of the CORTEX initiative to build on malware detection capability provided by ISPs.

Cybersecurity guidance for board members: how to tell if your organisation is a breach target
Thu, 24th May 2018
#
ai security
#
risk & compliance
#
ai
Cybersecurity is no longer just an IT issue, leadership from the board has never been higher or a more pressing priority.

ThreatQuotient appoints ex-Cisco security sales chief to lead APAC expansion
Wed, 23rd May 2018
#
cisco
#
threat intelligence
#
threatquotient
ThreatQuotient has chosen Australia as its Asia pacific base. Former Cisco security sales chief Anthony Stitt will lead operations.

Organisations in Asia uncovering potential of advanced cybersecurity services
Tue, 8th May 2018
#
threat intelligence
#
dark web
#
adura
Companies in Asia are moving beyond compliance requirements to see value in threat intelligence, network AI behavior and phishing susceptibility.

emt Distribution appointed as ThreatConnect’s first ANZ distie
Thu, 19th Apr 2018
#
cybersecurity
#
threat intelligence
#
distributors
The deal means resellers will now be able to offer ThreatConnect's complete threat intelligence platform to end-customers.

Illumio & Qualys combine forces to offer vulnerability threat mapping
Tue, 17th Apr 2018
#
threat intelligence
#
security vulnerabilities
#
illumio
Illumio and Qualys are joining forces to combine threat data and application dependency mapping to show potential cyber attack paths in real time.

CERT NZ partners with Orange Business Services on comprehensive threat intelligence
Mon, 16th Apr 2018
#
threat intelligence
#
orange business services
#
cert
CERT NZ and Orange Business Services collaborate in threat intelligence sharing to boost analysis of cyber threat data.

SonicWall supersizes threat protection with new Capture Cloud Platform
Wed, 11th Apr 2018
#
data protection
#
endpoint protection
#
breach prevention
Winning the cyber arms race requires a consistent, agile, reputable stream of real-time cyber threat intelligence, explains SonicWall CEO Bill Conner.

Carbon Black launches tech partner program to improve collective security defences
Wed, 4th Apr 2018
#
siem
#
juniper networks
#
logrhythm
Carbon Black has launched a new technology partner program that is designed to improve cybersecurity through collective defence.

iJET International expands 24/7 risk management to APAC through Singapore base
Wed, 28th Mar 2018
#
risk & compliance
#
threat intelligence
#
ijet international
iJet International enhances its 24/7 risk management footprint in APAC with a new Singapore base, boosting global capabilities and local support.

Not quick enough: Most firms can't detect or contain a breach within one hour
Wed, 28th Mar 2018
#
siem
#
breach prevention
#
cybersecurity
New research from LogRhythm reveals that fewer than half of global organisations can detect a major cybersecurity breach within one hour.

Sydney's Joint Cyber Security Centre opens in Darling Park
Thu, 22nd Mar 2018
#
cybersecurity
#
australian government
#
threat intelligence
Sydney is now home to Australia’s newest Joint Cyber Security Centre (JCSC), which was officially opened this week by Angus Taylor.

NSW Auditor-General uncovers State's inconsistent approach to cybersecurity
Tue, 13th Mar 2018
#
breach prevention
#
cybersecurity
#
security breaches
New South Wales' public sector lacks the capability to effectively detect and respond to cybersecurity incidents, warns the state's Auditor-General.

Blueliv makes plea for cybercrime intelligence sharing across industries
Thu, 8th Mar 2018
#
malware
#
uc
#
data privacy
With malware continually evolving, Blueliv says it's crucial that the 'good guys' begin to collaborate in the fight against cybercrime.

Anti-phishing software integrates with SIEMs to secure the enterprise
Tue, 27th Feb 2018
#
siem
#
phishing
#
email security
Cofense’s anti-phishing software now integrates with SIEM systems, fortifying enterprise security by automating incident response and threat intelligence.

Empower and mobilise your 'human sensors' to fend off phishing attacks
Tue, 27th Feb 2018
#
phishing
#
email security
#
threat intelligence
Some of the largest enterprises in the world fall victim to phishing attacks, even with the latest and greatest technologies. Why?.