Techday Network
Sign in
Sign up
The grand central station for Kiwi technology news
Results:
Lew Kai Ping
These search results are from across the Techday network of sites
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
Secure Logic calls on Federal Govt to introduce IoT regulation
“The vast majority of people are not aware of the significant risks posed by unsecured IoT devices.”
Aus businesses see themselves as prime targets for cyber attacks
The survey of 307 Australian IT and security executives demonstrates the considerable uncertainty faced by businesses in trying to combat cybersecurity threats.
ThreatQuotient partners with Visa for payments safety
“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.”
Gartner names Bitglass a leader in cloud security
Bitglass was evaluated based on its ability to execute and its completeness of vision.
Universities seeing rise in DDoS attacks
Overall, between July and September, DDoS botnets attacked targets in 82 countries.
2018’s worst malware revealed in report
Webroot has highlighted the top cyberattacks of 2018 in its latest Nastiest Malware list, which showcases the malware and attack payloads that have been most detrimental to organisations.
Opinion: Router security leaving major cyber exposure gap
Hardware is frequently tossed to one side upon installation and left to fester without security updates.
How phishing is evolving to outpace awareness
While email providers have made strides in flagging suspicious emails and source domains, reducing the effectiveness of attacks, attackers’ techniques have also evolved.
Businesses unprepared for Windows 10 migration – survey
Respondents cited IT security and fears of being exposed to a cyber security vulnerability as two areas of concern.
Organisations lack holistic approach to data protection
It is paramount for organisations to have a clear understanding of what data protection is and close the gaps in their protection strategies.
LogRhythm reports higher-than-anticipated SOAR adoption rate
The company’s embedded security orchestration, automation and response (SOAR) capabilities are embedded in its security information and event management offering.
Trend Micro and NTT DOCOMO partner on 5G security
This solution is built upon the recently announced Trend Micro Virtual Network Function Suite (VNFS) on NTT DOCOMO's "docomo 5G open cloud."
Security experts comment on latest OIAC report
The Office of the Australian Information Commissioner has been notified of 245 data breaches affecting personal information between July and September 2018.
Voter databases available on the dark web - report
A Carbon Black threat report has revealed that destructive cyberattacks are increasing ahead of 2018 US midterm elections.
Sony reveals full list of 20 playable games in PlayStation Classic
Sony has now announced the full list of old-school games that you can play when the PlayStation Classic console comes out later this year.
Is blockchain a solution to IoT security problems?
Could using blockchain to trace and authenticate IoT data, regardless of what that data is be the answer to the problems plaguing the Internet of Things?
Details of 9mil compromised in Cathay Pacific data leak
Twenty-seven credit card numbers with no CVV were accessed, and the combination of data accessed varies for each affected passenger.
SD-WAN deployments up, but networking and security challenges persist
The report, commissioned by Barracuda Networks, includes data from more than 900 respondents in the Americas, EMEA, and APAC.
Vodafone and Telstra partner to bring security solutions to NZ
Vodafone security management services aim to help businesses navigate their security landscape and manage risk.
Why operational technology environments need to be secured
By understanding the cybersecurity risks in OT, decision-makers are better placed to make smart buying decisions.
Bitdefender expands offerings with RedSocks acquisition
RedSocks provides non-intrusive, real-time breach detection solutions and incident response services.
Trend Micro rebrands endpoint security offering
Trend Micro Apex One aims to redefine endpoint security with consistency across SaaS and on-premises deployments.
« First
‹ Prev
1
2
3
4
5
6
7
8
…
Next ›
Last »