Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Australian tech platform signs major global contracts
"The cost of non-compliance can be detrimental for businesses."
Businesses not adopting reasonable care standard for security
One of the most serious disconnects between CISOs and other business leaders is their approach to the reasonable care standard for security and resiliency, Wavelink says.
What a CFO’s disaster recovery plan looks like
Most corporate organisations don’t put a disaster recovery plan in place and underestimate how much employees and operations can be impacted.
Compliance and cloud making SME security more complex
As compliance requirements continue to filter through the supply chain, they can come as a rude shock to a small business, says Ecosystm.
Digital optimisation makes HR processes easier - Hyland
Although we tend to think of data breaches as the work of malicious hackers, carelessness and mishandling of sensitive documents are just as likely to be the culprit.
Enterprises missing out on benefits of cloud, research finds
"There is significant scope for companies to fully realise all the benefits offered by the cloud."
Why there is a critical need to fix network comms security - Kemp
TLS 1.3 is designed to solve many of the vulnerabilities that led to attacks on previous TLS versions, as well as to improve the performance of encrypted communications.
Enterprises must get serious about data governance - Ecosystm
Just as health records being found in a dumpster was a risk in the 20th century, the risks of sloppy data management are real and rising.
GDPR: Where does your organisation stand after the first year?
The UK’s Information Commissioner’s Office (ICO) has received an average of 1267 data breach notifications each month.
Interview: Businesses must prepare for privacy regulation update
Privacy regulation in New Zealand is taking its cues from regulation in other jurisdictions - in particular the GDPR.
CEOs falsely led to believe company is GDPR compliant - Delphix
Delphix spoke to CISOs, CIOs, testers and developers at UK companies to find out the state of play at their organisations.
Only 20% of organisations use cloud DLP – Bitglass
Each year, Bitglass conducts research on the state of enterprise cloud security in order to identify key trends and common vulnerabilities.
ThetaRay offering uses AI against financial cybercrime
ThetaRay version 4.0 enable banks to pinpoint activity that suggests money laundering, terrorist financing, human and drug trafficking, and other financial crimes.
RSA responds to increasing A/NZ regulations with new updates
The new data protection and privacy management capabilities will help business in the A/NZ region to better ensure data protection and privacy regulations and compliance, according to the company.
Fortinet extends application security on Amazon Web Services
Fortinet to secure applications on AWS with FortiWeb Cloud WAF-as-a-Service while protecting applications and APIs and addressing compliance requirements.
Meeting the card payment industry’s compliance requirements - Kemp
Combating CNP (card not present) fraud has become a key priority across the entire e-commerce community.
Exclusive: VMware’s challenges and opportunities in cybersecurity
While it’s still critically important to have a strong perimeter, it is widely accepted now that the status quo of security simply doesn’t work anymore.
Top three ways to improve financial compliance for your business
“Companies can mitigate risk of fraud by creating a strong compliance culture, and by implementing and enforcing strong policies around spend management.”
Reckon releases free single touch payroll mobile app
The STP App was created in partnership with UX, design and development specialists Thinkmill.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.
Four steps to Zero Trust network security - AlgoSec
The core principles of zero trust reflect the reality of today’s complex, heterogenous enterprise network environments.
Vertel establishes Australian compliance for the Telo TE390
Vertel has met the compliance obligations including a declaration of conformity and RCM labelling for the Telo TE390.
Admin major barrier to small business success
Reveals an opportunity for Australian MSPs in SMB to provide admin streamlining solutions.