Technology news from the future
Lew Kai Ping
These search results are from across the Techday Network of sites
Exclusive: Building robust cloud-based backup and DR into ransomware defence
Ransomware is on the rise again and it’s getting smarter.
EMA names Pulse Secure leader in hybrid IT secure access platform solutions
The survey included executives from over 200 enterprises and an analysis of hundreds of vendor product briefings, case studies and demonstrations.
AI, 5G, and big data: CIOs talk macro trends at Summit
Events like this provide a unique opportunity to meet up with leading organisations and players in most of the vertical sectors.
Exclusive: How to intentionally build security into a network
Intent-based networking (IBN) offers an opportunity to design security objectives into the fabric of a complex network, and then enforce them.
Exclusive: AI leading the way in the evolution of video security
This is being driven, in part, by a recent evolution in processing power, allowing analytics to keep pace with the influx of data.
SailPoint updates IdentityIQ to expand definition of digital identities
The update gives enterprises the ability to govern non-human identities such as software bots, including robotic process automation (RPA) bots.
Data protection overlooked in race for digital transformation - IDC
Only with resilient operations can businesses mitigate the risk of downtime and focus on projects that drive transformation.
Veritas updates data management solution with simplified user experience
“Our customer user experience is one of the priorities we’re focusing on today.”
Exabeam and Okta partner to add context to identity management
The joint Exabeam and Okta solution will help security teams to monitor and protect enterprises against credential-based threats.
Securing your cloud data: Point solutions vs single pane of glass
Organisations that can use fewer security products that individually offer more capability are likely to have a lower total cost of ownership.
Is BYOD an expensive mistake for your business?
Security is one of the biggest issues with BYOD because of the security risk posed by consumer-grade phones.
Cryptomining and IoT attacks gunning for healthcare industry
Medical staff now carry multiple connected devices with them, including personal devices that lack appropriate security controls.
Compass Health deploys BlackBerry endpoint management for mobile security
Compass Health, in operation since 1995, has 60 general practice teams and a number of other healthcare providers in its jurisdiction.
The five-step guide to securing data in the cloud - IDC
This is especially important with the implementation of privacy regulations such as GDPR.
Securing IoT infrastructure with edge computing
Not only do organisations need to keep valuable data safe, but it is vital that all technology complies with stringent data protection regulations.
Exclusive: How AI and quantum computing are changing cybersecurity
New technologies have a way of impacting existing industries in unexpected ways.
Hackers using spearphishing to target banks –Bitdefender
To limit the risk of being discovered, attackers operated outside of normal business hours and cashout operations were planned for weekends.
Privacy management company OneTrust expands into AU and NZ
The expansion includes a new office, local data centres and updated product offerings to meet new and amended Australia and New Zealand privacy laws.
MikroTik routers in NZ may be at risk of cryptomining - Symantec
These routers are used by many organisations and businesses, including internet service providers.
Vehicle security startup Trillium recognised by innovation platform
Trillium's global research and development centres develop cybersecurity solutions for vehicle fleets.
Top tips to avoid downloading malicious online banking apps
Fake apps may require excessive permissions, demand administrator rights, or simply request you enter your banking details and related information.
How Kiwi SMBs can connect and trade, quickly
Trade exchange platform Bartercard has recently launched its app, designed to help Bartercard members utilise the network more efficiently.
Over 2,300 data breaches disclosed so far in 2018 - report
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
Gigamon partners with Endace for improved network visibility
Analysts often struggle to uncover the evidence they need to quickly determine the root cause of cyber threats.