FutureFive New Zealand - Consumer technology news & reviews from the future

Opinion stories - Page 22

Untitled design  19

NZ universities accepting English proficiency tests through Duolingo

Thu, 8th Jan 2026
#
edutech
#
e-learning
#
ai
New Zealand universities now accept Duolingo English tests from overseas students, reflecting a global shift in language proficiency checks.
Untitled design  16 (2)

'One part terrified, one part really angry' - Assault victim's anger over Manage My Health hack

Thu, 8th Jan 2026
#
data protection
#
ransomware
#
phishing
A sexual assault survivor says she feels re‑victimised and furious after the Manage My Health hack and US$60,000 ransom demand.
Untitled design  13

ManageMyHealth fixes code and bolsters security after hack

Thu, 8th Jan 2026
#
data protection
#
ransomware
#
mfa
ManageMyHealth says it has fixed code flaws and tightened logins after a hack that may have exposed health documents of up to 7% of users.
The future of authentication in 2026 insights from yubico s experts.png

The future of authentication in 2026: Insights from Yubico's experts

Thu, 8th Jan 2026
#
data protection
#
mfa
#
crypto
Yubico experts say 2026 will redefine authentication, with post-quantum security, digital ID wallets and AI-driven threats converging.
Modern healthcare hospital under scrutiny magnifying glasses checks

Healthcare now operates inside the audit

Wed, 7th Jan 2026
#
risk & compliance
#
healthtech
#
productivity
As payers deploy always-on audits, healthcare must hardwire real-time documentation and coding checks into everyday clinical practice.
Caspar update

What business leaders need to know about AI in 2026 and risk

Wed, 7th Jan 2026
#
devops
#
manufacturing
#
digital transformation
AI in 2026 will bring harsher harms and huge gains, forcing business to prioritise governance, greener models and pragmatic industrial uses.
Why identity verification starts with accurate address data

Why accurate address data is the first line of identity verification

Wed, 7th Jan 2026
#
digital transformation
#
fintech
#
cx
Accurate address data is emerging as a critical, often overlooked weapon in the fight for reliable digital identity verification and fraud control.
Daryush ashjari   oct 2023   3

Five hard truths about enterprise AI heading into 2026

Wed, 7th Jan 2026
#
virtualisation
#
hybrid cloud
#
digital transformation
APAC firms face a 2026 AI reckoning, forced to turn fragile pilots into robust, edge-ready systems without collapsing legacy IT.
Nz suburban dusk street data breach shadowy hacker scene

Neighbourly data breach: Stuff files High Court injunction

Mon, 5th Jan 2026
#
data protection
#
phishing
#
email security
Neighbourly has been taken offline while Stuff and external experts probe claims of a data breach affecting the community website's users.
Sam salehi   qualys managing direct

Three cybersecurity predictions that will define the CISO agenda in 2026

Mon, 5th Jan 2026
#
hybrid cloud
#
digital transformation
#
cloud security
By 2026, CISOs will tame security noise, confront hidden AI risks and harness agentic AI to turn reactive defence into strategic action.
7 fraud trends shaping the identity landscape

Top Fraud Trends and Considerations for 2026

Mon, 5th Jan 2026
#
uc
#
data protection
#
digital transformation
AI-driven fraud, deepfakes and synthetic IDs are redefining 2026 risk, forcing firms to ditch reactive tools for layered, intelligent defence.
Blue profile  1

Starting 2026 strong: how investors can navigate the new year with clarity and confidence

Fri, 2nd Jan 2026
#
blockchain
#
risk & compliance
#
opinion
After crypto's quietly mature 2025, 2026 rewards investors who tune out noise, stick to a plan and favour discipline over prediction.
Why data trust is the missing link in digital transformation

Why data trust is the missing link in digital transformation

Thu, 1st Jan 2026
#
data analytics
#
digital transformation
#
cx
Digital transformation falters not for lack of tech, but because untrusted data quietly undermines scale, speed and customer experience.
Data governance crucial ai preparation

Why data governance is critical for Generative AI success

Wed, 31st Dec 2025
#
data protection
#
data analytics
#
digital transformation
Generative AI promises transformation, but without modern, rigorous data governance frameworks, projects risk failure, fines and lost trust.
Email verification is essential for compliance and inbox placement

The email you almost sent: Why skipping verification costs you customers

Tue, 30th Dec 2025
#
data protection
#
cx
#
martech
Skipping email verification can throttle your campaigns, wreck deliverability, and quietly bleed customers from every send you make.
Shopping cart

From click to delivery: How bad data breaks the eCommerce experience

Tue, 30th Dec 2025
#
cx
#
martech
#
commerce systems
Bad data is quietly wrecking Asia's eCommerce, fuelling failed deliveries, higher costs and eroding customer trust from click to doorstep.
Hacker 2077138 640

How identity verification could have stopped a $300M Crypto scam

Wed, 24th Dec 2025
#
malware
#
uc
#
ransomware
North Korean hackers stole USD $300M via fake Zoom calls; robust identity checks could have broken the scam's chain of trust.
Cross border identity verification challenges and solutions

Challenges and solutions in cross-border identity verification

Tue, 23rd Dec 2025
#
data protection
#
surveillance
#
digital transformation
As cross-border payments soar towards USD $1 quadrillion, businesses race to tackle identity fraud with AI, biometrics and smarter data.
Tadas sar t01gzhbsymq unsplash

Has 2025 seen a successful refresh to Windows 11?

Mon, 22nd Dec 2025
#
data protection
#
digital transformation
#
cloud security
Windows 11 now leads with 53.7% market share, but 2025's patches, bugs and pressure tactics have left many users unconvinced by the upgrade.
1761910815706

From hype to reality: The three forces defining security in 2026

Mon, 22nd Dec 2025
#
wearables
#
data protection
#
smart cities
In 2026, agentic AI, digital twins and AR wearables shift from hype to daily tools, reshaping how security risks are detected and managed.