DDoS attacks have been a significant feature of the cyber threat landscape over the past two decades. The 2021 Imperva…
Browsing: Headlines
Chillisoft headlines bring you the latest and most important news across the cybersecurity landscape in New Zealand, Australia, and the Pacific. This section is where you’ll find breaking updates, strategic announcements, and critical insights that matter to our partners, vendors, and the wider IT security community.
From leadership changes and major certifications to vendor partnerships, product milestones, and industry awards, Chillisoft headlines deliver fast, reliable updates straight from the source. Stay up to date with the stories shaping Chillisoft’s direction and the broader cybersecurity market, all curated for relevance and impact.
In this space, we also cover developments across our vendor ecosystem, including news from leading brands from our vendor portfolio. Whether it’s a new product rollout, an industry accolade, or a major update to a platform like ESET PROTECT Hub or Armis Centrix, you’ll see it here right away!
Chillisoft headlines also feature timely commentary on emerging threats, trends, and technologies, including AI-driven risks, compliance changes, and cybersecurity skills shortages. These pieces are designed to help partners and customers navigate a fast-moving environment with confidence and clarity.
If you’re a partner, MSP, IT lead, or vendor, this section gives you the quick hits you need to stay informed and make smarter decisions. It’s also a useful reference for sales, marketing, and strategy teams looking to track shifts in the channel and cybersecurity space.
Check the Chillisoft headlines regularly to keep pace with key developments across the industry.
Imperva’s 2021 Bad Bot Report shows bad bots now account for over a quarter of all internet traffic, with Telecom, IT, and News sectors hit hardest. The report highlights evolving tactics, mobile impersonation, and growing threats across industries.
Zero Trust security challenges the traditional perimeter-based model by assuming no user or device should be trusted by default. Learn how this model works and why adoption is accelerating in 2024.
Zero trust remote access is changing how we connect. This opinion piece explores why VPNs may soon be obsolete, and how Chillisoft uses solutions like Netskope and CyberArk to deliver secure access without complexity.
Vulnerability Scanning vs. Penetration Testing Penetration testing exploits a vulnerability in your system architecture while vulnerability scanning (or assessment) checks…
ESET’s new ransomware paper reveals 71 billion RDP attack detections and explores how cybercriminals exploit remote access, email, and supply chains—plus offers actionable defense advice for businesses.
Summary Major sporting events, like the World Cup or the Olympics, are usually targets of cybercriminals that take advantage of…
Earlier this year, in a country populated with over 50 million people, a series of protests began due to higher…