Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Moving beyond fear with business assurance technology
Westcon Imagine 2014 - Security technology can focus on prevention and prohibition - and instil a culture of fear. Or it can centre on possibilities and enable companies to unleash their full business potential.
Cyber security is not enough: Think resilience
Westcon Imagine 2014 - The ability to understand modern attacks, and implement the right procedures and response strategies as a result, is an art which still requires perfection in business.
Making your protection software-defined
Westcon Imagine 2014 - You may be well on your way to software defined networking, but how about your software defined protection?
Tightening the grip on governmental security
GSMA and Secure Identity Alliance have released a report that focuses on the importance of mobile identity for governments.
Symantec to split too
Symantec has followed HP's lead in announcing it too will split, forming two independent, publicly traded companies, one focused on security and the other focused on information management.
Meet the Big Data professionals (it’s not who you think)
Reckon the top users of Big Data are the likes of banks, consumer products companies and mass marketers? Maybe so, but there’s another industry altoge
Half of NZ businesses 'unprepared' for cyber threats
Kiwi businesses are unprepared for the increasingly advanced and sinister threats we're exposed to.
Harsh realities hit home for CIOs
IT decision makers are under increasing pressure from the boardroom - and that's impacting the roll-out of new business initiatives.
Advanced threat protection: Now more than ever
Joshua Alcock, Fortinet senior systems engineer, outlines the five critical components to advanced threat protection.
First we had heartbleed, now we're shellshocked
"The recent Heartbleed vulnerability is similar in nature to Shellshock, but Heartbleed is dwarfed by the extent and reach of this new vulnerability."
Security: Counter measures to protect your customers
Businesses are on heightened alert after numerous news reports about cyber threats and APTs. Here's what you can do to help them.
Celeb nude photos prove passwords are passé...
The 4Chan nude celebrity photo hack reveals password protection has passed its use-by date warns Derek Morwood, Regional Manager of unified identity management leader Centrify.
How to communicate IT security benefits to executive management...
The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive communication.
Power of Internet of Things to change CISO security scope
"The power of an Internet of Things device to change the state of environments and of itselfwill cause chief information security officers (CISOs) to redefine the scope of their security efforts beyond present responsibilities."
iPhone owners warned of iOS 8 prank
If you’ve been online today, you've probably seen posts with instructions for a supposedly new IOS8 feature called "Apple Wave".
Cyber security project puts NZ on the map
"Hopefully we can create a new niche for New Zealand in software - and we can create jobs, contribute to the economy and increase demand for more research."
Mako: Keeping POS safe... Backoff!
A difficult to detect malware is targeting POS systems, warns Ken Caballero, Mako channel account manager. He offers some tips on how you can keep your customers safe.
ESET: When one OS ‘closes’, a Window opens...
Microsoft’s end of support for Windows XP provides an opportunity for the New Zealand channel, says Sieng Chye, ESET security researcher.
OPINION: How to ensure security during an IT transformation...
Recent worldwide security breaches, among even security conscious companies, have shone an uncomfortable spotlight on corporate security and compliance measures.
Enterprise beware... 75% of mobile apps will fail basic security tests
"Enterprises that embrace mobile computing and bring your own device (BYOD) strategies are vulnerable to security breaches unless they adopt methods and technologies for mobile application security testing and risk assurance."
Hands up if you're telling the truth...?!
Is the Prime Minister’s honesty now central to the election...?!
Southern Cross Cable CEO slams "total nonsense" spy claims
"I can tell you quite categorically there is no facility by the NSA, the GCSB or anyone else on the Southern Cross cable network."
Trend Micro: Navigating the security minefield...
One size doesn’t fit all in security, says Robin Marjason, Trend Micro Australia and New Zealand channel and distribution director.
Dotcom: “We’ll close one of the Five Eyes…”
Met with rapturous applause from a jam-packed Auckland Town Hall, Kim Dotcom’s ‘Moment of Truth’ event last night has sent shockwaves across the country.