News

08 February 2022/ News
Log4Shell Explained: Remote Code Execution and Widespread Impact Imperva blocked over 102 million Log4Shell exploit attempts! The Log4Shell zero day vulnerability is truly one of the most significant security threats…
27 January 2022/ Updates
Imperva leads again in the WAAP Magic Quadrant, ranked highest for Completeness of Vision and trusted to stop billions of attacks every day.
27 January 2022/ Updates
Imperva’s 2021 eCommerce security report reveals rising bot attacks, DDoS spikes, and data leakage risks for retailers, especially in New Zealand.
22 October 2021/ News
Chillisoft has been named LogRhythm’s New Zealand Distributor of the Year for the second year in a row, recognised for its sales momentum, value-added services, and partner success.
19 October 2021/ News
Chillisoft has launched a managed detection and response (MDR) service for ESET in Australia, combining advanced endpoint protection with 24/7 SOC support tailored to SMB and MSP needs.
06 October 2021/ Case Studies
In this Imperva Application Security case study, Tower Insurance enhanced website protection and uptime with Cloud WAF, gaining real-time visibility and seamless deployment across its digital services.
23 September 2021/ Updates
Netskope Private Access delivers full Zero Trust Network Access (ZTNA) capabilities, enabling secure, scalable access to private applications without the limitations of legacy VPN.
10 September 2021/ Updates
The Imperva DDoS attack report reveals a surge in threats linked to global conflict, with new vectors and record-breaking Layer 7 activity.
23 August 2021/ Updates
Imperva’s 2021 Bad Bot Report shows bad bots now account for over a quarter of all internet traffic, with Telecom, IT, and News sectors hit hardest. The report highlights evolving…
20 August 2021/ Updates
Zero Trust security challenges the traditional perimeter-based model by assuming no user or device should be trusted by default. Learn how this model works and why adoption is accelerating in…
17 August 2021/ Updates
Zero trust remote access is changing how we connect. This opinion piece explores why VPNs may soon be obsolete, and how Chillisoft uses solutions like Netskope and CyberArk to deliver…
13 August 2021/ Updates
Vulnerability scanning and penetration testing serve different but complementary roles in cybersecurity. Scanning identifies known vulnerabilities across a broad network automatically and frequently, while penetration testing involves expert-driven, targeted attacks…
11 August 2021/ Updates
ESET’s new ransomware paper reveals 71 billion RDP attack detections and explores how cybercriminals exploit remote access, email, and supply chains—plus offers actionable defense advice for businesses.