Industry insider news for New Zealand's technology resellers
Login
Register
Search
Results:
Cybersecurity strategy
These search results are from across the Techday network of sites
21 Jan
Achieving cyber resilience in the telco industry - Accenture
Whether hackers are motivated by greed, or a curiosity to assess a telco’s weaknesses; the interconnected nature of the industry places it in a position of increased threat
More
08 Jan
Implementing shared security models in the cloud
Developers aren’t usually aware of every control that should be implemented to ensure security in cloud environments.
More
01 Jan
How protecting critical infrastructure starts with securing social media
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
More
03 Dec
Govt announces cybersecurity grants for SMBs
Over the next two years, eligible small businesses can apply for individual grants of up to $2,100.
More
14 Nov
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
More
09 Nov
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
More
08 Nov
Don’t let your network outgrow your IT team
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."
More
07 Nov
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
More
05 Nov
Securing your cloud data: Point solutions vs single pane of glass
Organisations that can use fewer security products that individually offer more capability are likely to have a lower total cost of ownership.
More
02 Nov
The key pillars of strong cybersecurity strategies
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.
More
01 Nov
LogRhythm reports higher-than-anticipated SOAR adoption rate
The company’s embedded security orchestration, automation and response (SOAR) capabilities are embedded in its security information and event management offering.
More
19 Oct
More OT devices added to Tenable's industrial security offering
Most operational technology systems run in heterogeneous environments, with devices from numerous industrial vendors, often relying on unique, proprietary protocols.
More
17 Oct
GDPR compliance: Looking beyond the hype
With contrasting advice coming from all angles, the line between GDPR fact and fiction has become blurred.
More
15 Oct
Exclusive: Cybersecurity in the API economy
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
More
11 Oct
Trend Micro’s four pillars of cybersecurity strategy
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
More
09 Oct
Industrial control systems: How to approach OT cybersecurity
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.
More
05 Oct
Carbon Black: Is your cyber panic room ready?
Cyber spies and cyber criminals alike are setting our networks on fire.
More
24 Sep
Cybersecurity for dummies: How to minimise the risk of data loss
"The value of the data you cannot touch is more than the price of the device you can hold."
More
17 Sep
Exclusive: Aura on designing a secure IT infrastructure
Being secure by design is an ongoing process and not one that is forgotten as soon as a project is complete.
More
14 Sep
Aus companies must build security expertise to develop cyber resilience
Are Australian organisations making the right investments in their operations when it comes to security?
More
29 Aug
APAC ahead of US and EMEA in AI security adoption - Osterman
Companies realise they need to improve the way they manage security and policy, and they also realise that automating workflows and processes is key.
More
27 Aug
Exclusive interview: RSA on the road to AI security
Organisations are now capable of leveraging AI as its advanced to the point of addressing critical issues in cybersecurity.
More
24 Aug
Data protection overlooked in race for digital transformation - IDC
Only with resilient operations can businesses mitigate the risk of downtime and focus on projects that drive transformation.
More
22 Aug
Is BYOD an expensive mistake for your business?
Security is one of the biggest issues with BYOD because of the security risk posed by consumer-grade phones.
More
« First
‹ Prev
1
2
3
Next ›
Last »