Asia's leading source of security and threat news
Login
Register
Search
Results:
Cybersecurity
These search results are from across the Techday network of sites
10 Nov
Public and private cooperation necessary to fight cybercrime
The ongoing cooperation between public and private organisations is important in the fight against cybercrime.
More
07 Nov
Trend Micro report predicts major cybercrime in 2015
The annual prediction report from Trend Micro, leader in cybersecurity, has been released for 2015.
More
30 Oct
UK school students could be the next cybersecurity whiz-kids
UK secondary school students will be taught cybersecurity, due an increasing skills gap in the industry.
More
28 Oct
Web security as a business enabler
Westcon Imagine 2014 - Can security boost productivity? For some Kordia customers, that’s certainly proving to be the case.
More
24 Oct
Fortinet's next-generation firewall platforms unveiled
Specialising in high-performance network security, Fortinet has unveiled two next-generation firewall platforms.
More
24 Oct
Subdomains increased security risk for businesses
Subdomains are not always properly validated, allowing attackers to set up new accounts and abuse subdomains forgotten by companies
More
24 Oct
New super massive firewall to protect all business sizes
Mid-sized organisations are finding themselves next up on hackers’ hit lists
More
24 Oct
Symantec aims to make businesses more resilient against attacks
Hackers do plenty of research to figure people out and exploit human nature
More
24 Oct
Why enterprises must make sense of cyber security
Westcon Imagine 2014 - As former Target CEO Gregg Steinhafel will no doubt attest, recent cyber attacks across the enterprise sector continue to cast serious doubt over security practices in business.
More
23 Oct
Philips Cloud Base: Efficiency meets IT security
Westcon Imagine 2014 - Cost efficiency, security and ease of management – what’s not to like about that?
More
23 Oct
Security analytics: Helping you do more, with less
Westcon Imagine 2014 - You’ve got your security technology in place and your SIEMs and logs – now you need an automated method to leverage those existing network security tools.
More
23 Oct
Moving beyond fear with business assurance technology
Westcon Imagine 2014 - Security technology can focus on prevention and prohibition - and instil a culture of fear. Or it can centre on possibilities and enable companies to unleash their full business potential.
More
22 Oct
Cyber security is not enough: Think resilience
Westcon Imagine 2014 - The ability to understand modern attacks, and implement the right procedures and response strategies as a result, is an art which still requires perfection in business.
More
21 Oct
Making your protection software-defined
Westcon Imagine 2014 - You may be well on your way to software defined networking, but how about your software defined protection?
More
14 Oct
Tightening the grip on governmental security
GSMA and Secure Identity Alliance have released a report that focuses on the importance of mobile identity for governments.
More
10 Oct
Symantec to split too
Symantec has followed HP's lead in announcing it too will split, forming two independent, publicly traded companies, one focused on security and the other focused on information management.
More
07 Oct
Meet the Big Data professionals (it’s not who you think)
Reckon the top users of Big Data are the likes of banks, consumer products companies and mass marketers? Maybe so, but there’s another industry altoge
More
06 Oct
Half of NZ businesses 'unprepared' for cyber threats
Kiwi businesses are unprepared for the increasingly advanced and sinister threats we're exposed to.
More
06 Oct
Harsh realities hit home for CIOs
IT decision makers are under increasing pressure from the boardroom - and that's impacting the roll-out of new business initiatives.
More
03 Oct
Advanced threat protection: Now more than ever
Joshua Alcock, Fortinet senior systems engineer, outlines the five critical components to advanced threat protection.
More
01 Oct
First we had heartbleed, now we're shellshocked
"The recent Heartbleed vulnerability is similar in nature to Shellshock, but Heartbleed is dwarfed by the extent and reach of this new vulnerability."
More
29 Sep
Security: Counter measures to protect your customers
Businesses are on heightened alert after numerous news reports about cyber threats and APTs. Here's what you can do to help them.
More
25 Sep
Celeb nude photos prove passwords are passé...
The 4Chan nude celebrity photo hack reveals password protection has passed its use-by date warns Derek Morwood, Regional Manager of unified identity management leader Centrify.
More
25 Sep
How to communicate IT security benefits to executive management...
The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive communication.
More
« First
‹ Prev
…
117
118
119
120
121
122
123
124
125
…
Next ›
Last »