Zero Trust security challenges the traditional perimeter-based model by assuming no user or device should be trusted by default. Learn how this model works and why adoption is accelerating in 2024.
Browsing: Headlines
Chillisoft headlines bring you the latest and most important news across the cybersecurity landscape in New Zealand, Australia, and the Pacific. This section is where you’ll find breaking updates, strategic announcements, and critical insights that matter to our partners, vendors, and the wider IT security community.
From leadership changes and major certifications to vendor partnerships, product milestones, and industry awards, Chillisoft headlines deliver fast, reliable updates straight from the source. Stay up to date with the stories shaping Chillisoft’s direction and the broader cybersecurity market, all curated for relevance and impact.
In this space, we also cover developments across our vendor ecosystem, including news from leading brands from our vendor portfolio. Whether it’s a new product rollout, an industry accolade, or a major update to a platform like ESET PROTECT Hub or Armis Centrix, you’ll see it here right away!
Chillisoft headlines also feature timely commentary on emerging threats, trends, and technologies, including AI-driven risks, compliance changes, and cybersecurity skills shortages. These pieces are designed to help partners and customers navigate a fast-moving environment with confidence and clarity.
If you’re a partner, MSP, IT lead, or vendor, this section gives you the quick hits you need to stay informed and make smarter decisions. It’s also a useful reference for sales, marketing, and strategy teams looking to track shifts in the channel and cybersecurity space.
Check the Chillisoft headlines regularly to keep pace with key developments across the industry.
Zero trust remote access is changing how we connect. This opinion piece explores why VPNs may soon be obsolete, and how Chillisoft uses solutions like Netskope and CyberArk to deliver secure access without complexity.
Vulnerability scanning and penetration testing serve different but complementary roles in cybersecurity. Scanning identifies known vulnerabilities across a broad network automatically and frequently, while penetration testing involves expert-driven, targeted attacks to exploit weaknesses. Each has unique costs, scopes, and risks. Together, they form a strong defense by helping organizations detect and remediate threats effectively. Training and skilled use of these tools maximize security posture and reduce costly troubleshooting.
ESET’s new ransomware paper reveals 71 billion RDP attack detections and explores how cybercriminals exploit remote access, email, and supply chains—plus offers actionable defense advice for businesses.
Cybercriminals targeted the 2020 Tokyo Olympics with a destructive malware disguised as a PDF about cyberattacks. This wiper deletes files tied to popular Japanese software and uses sophisticated anti-debugging techniques to avoid sandbox detection. It deletes a broad range of document and executable files while running misleading web requests to confuse forensic analysis. Netskope Threat Labs monitors this campaign and provides protection against these evolving threats.
A three-wave DDoS attack hit during civil unrest. See how fast hybrid cloud mitigation protected a nation’s critical infrastructure.
In this ExtraHop Reveal(x) case study, see how TRWD used NDR to boost visibility, respond to threats, and meet evolving cyber challenges.
ESET has secured ‘Champion’ status in the Canalys Global Cybersecurity Leadership Matrix for the third year running, praised for its enterprise growth and MSP platform enhancements.