Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Is the government’s new data breach bill going to give your business a bad reputation?
No one likes admitting when they’ve made a mistake. Especially if it’s a big one, like a leak that exposes customers’ private & personal information.
Big changes in the infosec landscape: Time to take note and take action
Do you like RDP? Good. So do attackers. Wait? What?! Yes, attackers love your weakly-defended RDP port as the payoff can be huge.
Future proofing solutions – what are we looking for in Hybrid Cloud Analytics?
Recently, we have seen a move towards “hybrid” – hybrid vehicles, hybrid sports equipment and more latterly hybrid watches. And why wouldn’t we?
8 reasons why you should move your ERP system to the cloud
A recent State of the Cloud Survey from RightScale revealed that 85% of enterprises in Australia and New Zealand (ANZ) have a multi-cloud strategy.
The rise of ransomware in Southeast Asia
It is likely that cybercriminals will target on internet of things (IOT) devices in technologically, advanced economies throughout Southeast Asia
Breaking down cloud computing and its nuances - Gartner
Cloud computing is often thought of as one technology, but organisations should consider which type of cloud computing is the most effective.
What we can learn from the Google Docs hack
Remember, don’t be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
Australia – Leading the way in diversifying cloud services
In the past few years, Equinix’s cloud ecosystem has diversified considerably, particularly in Australia, where demand for cloud services is strong.
The do's and don’ts of responding to ransomware
A smart incident response strategy for ransomware can help prevent significant loss and business downtime.
IoT: How the right upfront decisions can mean better performance, scalability and security
How many different services and microservices will you want to integrate to create an IoT application?
Auckland ISP sets up shop in provincial New Zealand
Unlimited Internet has established a Customer Service Centre in Palmerston North from where it will grow its customer base further throughout NZ.
The importance of integration in enterprise applications
So, as more companies move into real IoT implementations, the role of integration as the broker of “Thing” data will become fully realised.
DDoS: How Big Data can help combat a real and prevalent threat
DDoS attacks are becoming more and more prevalent. More than 2000 attacks observed every day force thousands of websites into shutdown.
Fingerprint security & biometrics: Three major myths busted
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
Mandatory Data Breach Reporting – what you need to start doing right now
Take heed or be caught out - Cyber-Risk puts together some tips to help you prepare for the breach reporting laws.
No favourites here: What makes up the art of cybersecurity warfare
As with any arms race, advances made by the good guys are often offset by advances made by the bad guys.
Firebox Cloud: Public cloud security for small and midsize businesses
A common misconception is that cloud providers offer comprehensive security to protect their customers.
Symbiosis: How PR done well can make the press better
In an ICT industry bursting with innovation and new ideas, being perceived as a reliable source of information is critical in developing trust.
Arbor Networks: Beware of headline risk with DDoS attacks
A term you will frequently hear in the stock markets is “headline risk” and it occurs when a news story adversely affects a stock's price.
Harness the rise of edge-based collaborative communities
“Collaborative communities” harness the power of proximity not only to meet the demands of the digital economy, but to exceed them.
How cloud, IoT and digital services have driven the development of DCIM as a service
Clearly the big trends which affect IT specifically and many vertical sectors generally, are also having an impact on the data center
Is it time to let the X-factor determine data center temperature?
The idea is that servers are sensitive to temperature; they fail more quickly at higher temperatures than lower temperatures.
Adiabatic and evaporative cooling techniques deliver big data center savings
In particular, the adiabatic system reduces the energy impact both in summer and in mid-season more, operating for the large part of the year.
Carbon Black: How to set up a threat hunting program
We know the attackers are out there – they are perpetually trying to break in, and many are succeeding.