Industry insider news for New Zealand's technology resellers
These search results are from across the Techday network of sites
NetWireless cuts network risk down to size with free network audit
WiFi and wireless networks are dangerous, but they’re also an inherent part of your devices, network and your employees’ mobility.
CASE STUDY: Aruba secures Italy’s largest commercial data centre with Honeywell
“The Honeywell solution plays a major role in providing the protection we require, hence we are delighted to have Honeywell as a key partner."
The five key elements of closed-loop network security
Why CISOs must adopt a closed-loop approach to network security.
OceanLotus Group thought to be targeting ASEAN nations on behalf of Vietnam
The OceanLotus Group, also known as APT 32, may be on the hunt for targets in ASEAN nations and acting on behalf of Vietnam state interests.
Global Telecoms Awards recognizes importance of 'signalling security'
“Over the last couple of years, we have seen more and more operators recognise the importance of securing their signalling network."
KRACK vs Secure WiFi: What your clients need to know
Ingram Micro de-mystifies KRACK and offers concrete advice to keep your client’s WiFi networks safe and secure.
Sophos targets unknown application traffic through new firewall offering
IT professionals are concerned about the security risks associated with unknown application traffic.
How to simplify your network's security through one platform
Why buy standalone products when what you really need is integration?
Understanding post-breach threat detection in the digital era
Rather than a single attack vector, a solution needs to focus on the whole attack cycle also known as “cyber kill chain”.
To upgrade or not to upgrade – that is the security question
When we think of security, we probably think ‘software’ first. But software runs on hardware, and network security and access appliances are aging.
Chinese 'Bronze Butler' group suspected of stealing IP from Japan
Bronze Butler’s operations suggest a long-standing intent to steal information from Japanese organisations.
Defence-in-depth: Hardening every component on the network
Ingram Micro advises on how to harden your client’s defences without breaking the bank.
Credential theft is the hottest trend for cyber attackers in Q2
This year cyber attackers have narrowed their focus to methods that involve credential theft, be it through malware, phishing or brute force attacks.
M1 takes on Nokia tech to offer network-based mobile security
Singapore telecommunications provider M1 says it has built Asia’s very first network-based mobile malware detection solution.
How an SD-WAN can cure those security blues
SD-WANs must play an increasingly critical role in securing enterprises, says ZK Research’s Zeus Kerravala, writing for Silver Peak. He outlines how.
Aruba extends focus on network security and behavioural analytics
Aruba has extended its reach into the security market by fusing together network security with User and Entity Behavioural Analytics.
How to ensure stronger security in the multi-front WiFi security battle
"Network and security operation teams are fighting a multi-front WiFi security battle," says Netscout's Amit Rao.
Why IT security is a critical part of every learning environment
“Education institutions rely on technology delivered through the network for learning. If a device brings down the network then learning stops."
New Webroot boss flags ANZ markets as 'great potential'
Webroot’s new global chief executive has flagged Australia and New Zealand as an area of ‘great potential’ for the cybersecurity vendor.
Hands-on review: Trend Micro’s Home Network Security simplifies how we get protected from cyber attacks
Protecting your devices from cyber attacks has never been this easy.
Time for kids to go outside and smell the roses: How to limit screen time in a connected world
Children have countless options on how they connect to the internet, so how do parents limit screen-time?
How to make your smart home safe when hackers are looming nearby
The more devices you connect to your network the more you need to protect, your data may be at risk...
The new tenets of effective threat protection
An IoA highlights the need to change focus from what already happened within your network to looking at potential issues as they happen.
Gather around the watering hole: Bronze Union attackers likely based in China
The 'active and formidable' Bronze Union group has been responsible for a spate of targeted attacks on Turkey - how do they do it?