Asia's leading source of security and threat news
Kai Ping Lew
These search results are from across the Techday network of sites
SnapLogic: Cutting through the SaaS sprawl
On average, enterprises are using 1,427 distinct cloud services, with the typical employee using 36 different cloud applications during their working day.
Time to give your security setup an end-of-year clean?
ExtraHop reminds businesses that ‘tis the season embark on the annual end of year clean: garages, closets and cybersecurity settings.
Patching: Reducing the gap between exposure and remediation
On average, it takes an organisation 90-120 days to deploy a patch to their devices, which is too big a gap between a patch being released and it being deployed.
Why supply chain companies should adopt cloud-based communications
Here are 8x8’s five reasons cloud-based communications applications will improve productivity and support growth for Australian transport and logistics businesses.
Moving to a multi-cloud environment? Eliminate security gaps with Fortinet
Multi-cloud environments are the new normal and securing them in a unified manner can be problematic – but not with Fortinet’s comprehensive multi-cloud-based Security Fabric.
Visibility and control to secure inconsistent cloud platforms – Fortinet
It takes consistency across the entire security ecosystem to fully protect cloud-based applications - Fortinet’s Josh Alcock explains how.
Programmable money will redraw the map of international trade
Those who control the most widely used currencies also control a great deal of the global economy, and it is time for New Zealand to get in the game.
How user-centred design is reshaping cybersecurity
A user-centered design approach starts with users and asking them what they want to gain a deeper understanding of their needs.
Adding value to your managed security services portfolio – Fortinet
Fortinet Security Fabric services can be delivered as a managed service and provides a sustainable source of additional revenues – here’s how.
Predictions: How process and workflow automation will evolve in 2020
Those who have started the journey with workflow automation will expand their efforts while some businesses who have yet to begin will get to work.
Unpopular opinion: The software monolith is wrongly maligned
We’re led to believe microservices are modern and monoliths are legacy - but it’s not that easy, writes Segment’s Alexandra Noonan and Calvin-French Owen.
Why zero trust is the best security strategy for mobile computing - Zscaler
Zero trust network access is helping organisations address the protection problem posed by mobile computing and cloud-based applications.
Why AI is your friend when it comes to cloud migration
Modern web-scale cloud applications are simply too complex to be operated by humans alone.
Addressing the cybersecurity skills gap
Cybersecurity is consistently rated as one of the most problematic skills shortage areas in the enterprise, Skillsoft says.
Australia’s digital transformation: Can’t sweat it? Don’t sweat it
What may have seemed a short-term benefit may soon change: a monthly subscription from a public cloud provider may suddenly turn to bill shock after the realisation that it can’t be turned off.
How to protect Industrial IoT from ransomware
Ransomware outbreaks in 2017 hit production networks worldwide, resulting in shutdowns, massive clean-up efforts and millions of dollars in damages, Claroty finds.
Time to turn the tables on cyber-attackers
Cyberattackers are no strangers to deception and trickery, and emerging ‘deception technology’ is giving the defending team an opportunity to turn the tables in their favour, Attivo finds.
The human eye as a proxy for the future of networking
In recent years scientists have been unravelling the intricate structure and wiring of retina neurons within the eye - Mellanox Technologies looks beneath the surface.
How cloud technologies are shaping the data-driven contact centre
According to a global Ecosystm cloud study, more than half (53%) of organisations have increased work processes and efficiency as a result of using the cloud.
Interview: Catalyst Cloud on the second wave of cloud innovation
The demand and use of containers and Kubernetes come from a deep realisation that there is a better way to package, deploy and run applications.
BitSight and ServiceNow announce integrations improving cyber risk management
Together, BitSight and ServiceNow provide organisations with prioritised visibility and automated workflows to manage cyber risk.
Application shielding startup RedShield raises $14m
RedShield CEO and co-founder Andy Prow says that taking capital from a New Zealand private equity player was a strategic choice.
VMware's open pledge to help partners and customers make their mark
Technology is neither good nor bad, but it’s often how we shape it. Will technology shape the world we want to live in? Or will it create a world we’re afraid to live in?
How to take your job search to the next level
What can you do to make sure you get the attention you deserve in your job search?