Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Web security as a business enabler
Westcon Imagine 2014 - Can security boost productivity? For some Kordia customers, that’s certainly proving to be the case.
Fortinet's next-generation firewall platforms unveiled
Specialising in high-performance network security, Fortinet has unveiled two next-generation firewall platforms.
Subdomains increased security risk for businesses
Subdomains are not always properly validated, allowing attackers to set up new accounts and abuse subdomains forgotten by companies
New super massive firewall to protect all business sizes
Mid-sized organisations are finding themselves next up on hackers’ hit lists
Symantec aims to make businesses more resilient against attacks
Hackers do plenty of research to figure people out and exploit human nature
Why enterprises must make sense of cyber security
Westcon Imagine 2014 - As former Target CEO Gregg Steinhafel will no doubt attest, recent cyber attacks across the enterprise sector continue to cast serious doubt over security practices in business.
Philips Cloud Base: Efficiency meets IT security
Westcon Imagine 2014 - Cost efficiency, security and ease of management – what’s not to like about that?
Security analytics: Helping you do more, with less
Westcon Imagine 2014 - You’ve got your security technology in place and your SIEMs and logs – now you need an automated method to leverage those existing network security tools.
Moving beyond fear with business assurance technology
Westcon Imagine 2014 - Security technology can focus on prevention and prohibition - and instil a culture of fear. Or it can centre on possibilities and enable companies to unleash their full business potential.
Cyber security is not enough: Think resilience
Westcon Imagine 2014 - The ability to understand modern attacks, and implement the right procedures and response strategies as a result, is an art which still requires perfection in business.
Making your protection software-defined
Westcon Imagine 2014 - You may be well on your way to software defined networking, but how about your software defined protection?
Tightening the grip on governmental security
GSMA and Secure Identity Alliance have released a report that focuses on the importance of mobile identity for governments.
Symantec to split too
Symantec has followed HP's lead in announcing it too will split, forming two independent, publicly traded companies, one focused on security and the other focused on information management.
Meet the Big Data professionals (it’s not who you think)
Reckon the top users of Big Data are the likes of banks, consumer products companies and mass marketers? Maybe so, but there’s another industry altoge
Half of NZ businesses 'unprepared' for cyber threats
Kiwi businesses are unprepared for the increasingly advanced and sinister threats we're exposed to.
Harsh realities hit home for CIOs
IT decision makers are under increasing pressure from the boardroom - and that's impacting the roll-out of new business initiatives.
Advanced threat protection: Now more than ever
Joshua Alcock, Fortinet senior systems engineer, outlines the five critical components to advanced threat protection.
First we had heartbleed, now we're shellshocked
"The recent Heartbleed vulnerability is similar in nature to Shellshock, but Heartbleed is dwarfed by the extent and reach of this new vulnerability."
Security: Counter measures to protect your customers
Businesses are on heightened alert after numerous news reports about cyber threats and APTs. Here's what you can do to help them.
Celeb nude photos prove passwords are passé...
The 4Chan nude celebrity photo hack reveals password protection has passed its use-by date warns Derek Morwood, Regional Manager of unified identity management leader Centrify.
How to communicate IT security benefits to executive management...
The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive communication.
Power of Internet of Things to change CISO security scope
"The power of an Internet of Things device to change the state of environments and of itselfwill cause chief information security officers (CISOs) to redefine the scope of their security efforts beyond present responsibilities."
iPhone owners warned of iOS 8 prank
If you’ve been online today, you've probably seen posts with instructions for a supposedly new IOS8 feature called "Apple Wave".
Cyber security project puts NZ on the map
"Hopefully we can create a new niche for New Zealand in software - and we can create jobs, contribute to the economy and increase demand for more research."