Asia's leading source of security and threat news
These search results are from across the Techday network of sites
How can you secure your enterprise network?
Fortinet’s ATP framework provides multi-layered defence-in-depth for enterprise networks.
How can you ensure your network is secure for digital transformation?
Digital transformation happens when you move business to the cloud. But if you can’t connect, you can’t work.
Opinion piece: Are cybersecurity investments wasted money?
No matter how much money we throw into cybersecurity, it seems to have little impact on reducing the damage of breaches and attacks.
Unmasking cyber criminals: research unveils six cybercriminal personalities
“The industrialisation of cyber crime means it has never been more important for businesses to understand and protect themselves against the risks."
The key challenges a business faces after an aggressive cyberattack
Global awareness of the rapid increase in the scale and sophistication of cyberattacks is skyrocketing.
Mind your fitness tracker: Wearables the latest attack target
Connected fitness bands, watches and wearables are becoming popular in consumer and enterprise markets; the opportunity for hackers is big business.
Cyber attackers are bolder, smarter and more daring
“Our observations for 2015 have confirmed that traditional methods of protecting data and assets are no longer sufficient and should be reassessed."
Your IT infrastructure could be taken over in just 12 minutes
The frequency and sophistication of cyber crime is growing everyday in line with the increasingly digital workplace.
Under attack? These four things will mitigate most cyber breaches
Cyberattacks are a fact of life for Australian business, but they don't have to be - here are four ways to help stop most cyber breaches.
Third-highest number of users clicking on malicious URLs goes to... Australia
Of late, ransomware threats have been specifically targeting Australian business and consumers, breaching security systems by appearing legitimate.
The time for micro-segmentation is now
Corporate security strategies are failing so leaders must re-tool to face the latest cyber threats.
Healthcare organisations buckle under pressure of cyber attacks
"The concurrence of technology advances and delays in technology updates creates a perfect storm for healthcare IT security."
Ramping up NZ’s response to serious cyber threat
Significant New Zealand organisations are being subjected to serious cyber-attacks on a daily basis - our national response is about to be ramped up.
New Android Trojan “Xbot” phishes credit cards and bank accounts, encrypts devices for ransom
We recently discovered 22 Android apps that belong to a new Trojan family we’re calling “Xbot”, which is already capable of many malicious behaviours.
Electronic payment security now a key consideration for consumers
“The poll shows that choice and security are customers’ priorities when making electronic payments. Consumers want diversity in payment options."
'Dangerous' email scam targets Australians
"The scam has increased in sophistication over time, using anti-virus defeating techniques and encryption, which makes it harder to stop the threat."
New Backstab cyberattack targeting iOS devices
The BackStab attacks see cyber criminals use malware to remotely infiltrate computers, with iOS devices particularly vulnerable.
Top 10 security threats for 2016
Check Point is anticipating the next wave of threats, hoping organisations can stay ahead of the evolving tactics of cybercriminals.
Kiwi businesses blasé about cyber attacks
Kiwi businesses continue to believe they're not at risk from cyber attacks according to a new report, which shows many are unprepared.
Rackspace ups its cloud security game
“Cyberattacks are the new normal for companies and represent one of the realities of doing business today.”
Organisations unprepared for the greatest security risks, survey finds
Cyber attackers posing as legitimate insiders represent the greatest security risks to organisations, according to a new survey by CyberArk.
Cloud Security Alliance establishes threat sharing scheme
Collaboration between vendors and businesses is a crucial part of ensuring attack reports are up-to-the-minute and provide specific info about threats
SMX warns Kiwi companies of 'highly sophisticated' email scam
Attackers are even following up with telephone calls prior to, as well as during, these attacks to further embellish the hoax.
Virtual infrastructure recovery costing businesses
"If there is not enough attention paid to security matters in the virtual environment, expenses may exceed the benefit.”