Log4Shell Explained: Remote Code Execution and Widespread Impact Imperva blocked over 102 million Log4Shell exploit attempts! The Log4Shell zero day vulnerability is truly one of the most significant security threats…
Chillisoft has been named LogRhythm’s New Zealand Distributor of the Year for the second year in a row, recognised for its sales momentum, value-added services, and partner success.
Chillisoft has launched a managed detection and response (MDR) service for ESET in Australia, combining advanced endpoint protection with 24/7 SOC support tailored to SMB and MSP needs.
In this Imperva Application Security case study, Tower Insurance enhanced website protection and uptime with Cloud WAF, gaining real-time visibility and seamless deployment across its digital services.
Netskope Private Access delivers full Zero Trust Network Access (ZTNA) capabilities, enabling secure, scalable access to private applications without the limitations of legacy VPN.
Imperva’s 2021 Bad Bot Report shows bad bots now account for over a quarter of all internet traffic, with Telecom, IT, and News sectors hit hardest. The report highlights evolving…
Zero Trust security challenges the traditional perimeter-based model by assuming no user or device should be trusted by default. Learn how this model works and why adoption is accelerating in…
Zero trust remote access is changing how we connect. This opinion piece explores why VPNs may soon be obsolete, and how Chillisoft uses solutions like Netskope and CyberArk to deliver…
Vulnerability scanning and penetration testing serve different but complementary roles in cybersecurity. Scanning identifies known vulnerabilities across a broad network automatically and frequently, while penetration testing involves expert-driven, targeted attacks…
ESET’s new ransomware paper reveals 71 billion RDP attack detections and explores how cybercriminals exploit remote access, email, and supply chains—plus offers actionable defense advice for businesses.