Consumer technology news from the future
These search results are from across the Techday network of sites
DDoS attacks target IT, telecoms and finance companies
"The days of DDoS attacks being an operational frustration that just resulted in some downtime are long over.”
Aussie-founded StratoKey eyes up US market
StratoKey, founded in Australia in 2012, is expanding operations of its intelligent cloud data protection solution into the United States.
Cost of data breach skyrockets: What can you do?
Today, security should be a top priority for organisations, with data breaches are growing in number and the financial cost growing too.
Accellion responds to growing security and governance needs
Mitigating risk and demonstrating compliance with industry regulations is becoming increasingly important in corporate boardrooms, says Accellion.
ESET: How your business can recover from a hack
Recent high-profile data breaches illustrate criminals’ insatiable appetite for data and financial reward.
Data breach concerns open door for deeper conversation for resellers
Around 50% of Kiwis believe organisations holding their personal data will be breached within the next year – for the channel, that means opportunity.
Telcos most likely to suffer data breach say Kiwis
Kiwis believe telcos are the least trustworthy organisations when it comes to keeping personal data safe - and they're ready to punish.
Technology: Just one part of the security problem
“As organisations embrace cloud computing and mobile technology solutions, they have extended the security perimeter, creating new considerations.'
$2 trillion cybercrime bill for business by 2019
The cost of data breaches is expected to soar to $2 trillion globally by 2019 - and its not mobile or IoT that will be the source of most breaches...
Unisys: Kiwi's trust eroded in data security
New Zealanders' confidence in local organisations’ ability to keep their data secure seems to have taken a hit...
Avoid the traps of human error
When people talk about data breaches, the tendency is to think about cybercriminals and hackers trying to access networks to extract valuable information.