Technology news from the future
Lew Kai Ping
These search results are from across the Techday Network of sites
MikroTik routers in NZ may be at risk of cryptomining - Symantec
These routers are used by many organisations and businesses, including internet service providers.
Vehicle security startup Trillium recognised by innovation platform
Trillium's global research and development centres develop cybersecurity solutions for vehicle fleets.
Top tips to avoid downloading malicious online banking apps
Fake apps may require excessive permissions, demand administrator rights, or simply request you enter your banking details and related information.
How Kiwi SMBs can connect and trade, quickly
Trade exchange platform Bartercard has recently launched its app, designed to help Bartercard members utilise the network more efficiently.
Over 2,300 data breaches disclosed so far in 2018 - report
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
Gigamon partners with Endace for improved network visibility
Analysts often struggle to uncover the evidence they need to quickly determine the root cause of cyber threats.
You’re invited: Azure experts share cloud success secrets
For a business just wanting to do what’s necessary, it can often be difficult to cut through the noise.
Exclusive: What will it take for blockchain to achieve mass adoption?
With the technology and its applications still an enigma to most, blockchain has a long way to go before it’s mature enough for many use cases.
Exclusive: MSSPs enabling holistic cybersecurity approach
“At the end of the day, two guys and security information and event management solution don't make a security operations center.”
FireEye brings machine learning to endpoint security solution
The machine learning model is trained with both public and private data sources, including data gathered from over 15 million endpoint agents.
Flaw discovered in Intel chips, allows attackers to steal cloud data
Foreshadow is the third major flaw found in Intel chips this year after Spectre and Meltdown.
How SMBs can grow their client base without cutting prices
Although they may seem to be the simplest solution, SMBs need to consider the trade-offs they are making by discounting.
Blurred lines: How counterinsurgent strategies apply to threat hunting
Successful counterinsurgency operations depend on thoroughly understanding the environments in which they are being conducted.
Exclusive interview: Major MFA vulnerability discovered in Microsoft’s ADFS
This exploit gives an actor an incredible advantage to expand compromises significantly.
Deep dive: How AI empowers today’s security operations analysts
“The biggest impact that AI is making in the SOC is faster time to triage.”
Bringing a gun to a gunfight: Countering AI-enabled threats
Artificial intelligence can reduce human effort and lower the time needed to detect, respond to, and recover from cybersecurity incidents.
Raiz chooses AI-powered cybersecurity solution for financial security and compliance
Raiz recently listed on the Australian Stock Exchange and implementing VSE was a key component of their compliance with financial regulations.
Using AI to address the cybersecurity skill shortage
There is an expected shortage of over 1.8 million security professionals worldwide over the next few years.
Blast off: Dicker Data announces winners of Houston Space Center trip
Winners will get to have lunch with an astronaut and take an in-depth Level 9 VIP tour of the Houston Space Center.
How to improve cash flow and get rid of excess inventory
Bartercard has members consisting of over 6,000 businesses in eight countries, with a trade volume of over $150 million a year.
You’re invited: SMB network management has never been so easy
NETGEAR’s Insight family of cloud managed solutions is a quick and easy way for MSPs to grow their current offerings.
Going for the big phish – are your execs safe from whaling attacks?
Security experts are seeing the proliferation of sophisticated, convincing emails impersonating C-level execs.
Security professionals are considering black hat activity - report
49% of global mid-market professionals were most likely to suggest that it's easy to get into cybercrime without getting caught.
Exclusive: How nation-state attacks impact businesses
With tensions between global superpowers rising, cyber attacks have become a new frontier for governments to gain an advantage over one another.