New Zealand's leading source of cybersecurity and threat news
These search results are from across the Techday Network of sites
More OT devices added to Tenable's industrial security offering
Most operational technology systems run in heterogeneous environments, with devices from numerous industrial vendors, often relying on unique, proprietary protocols.
GDPR compliance: Looking beyond the hype
With contrasting advice coming from all angles, the line between GDPR fact and fiction has become blurred.
Exclusive: Cybersecurity in the API economy
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
Trend Micro’s four pillars of cybersecurity strategy
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
Industrial control systems: How to approach OT cybersecurity
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.
Carbon Black: Is your cyber panic room ready?
Cyber spies and cyber criminals alike are setting our networks on fire.
Exclusive: Aura on designing a secure IT infrastructure
Being secure by design is an ongoing process and not one that is forgotten as soon as a project is complete.
Aus companies must build security expertise to develop cyber resilience
Are Australian organisations making the right investments in their operations when it comes to security?
APAC ahead of US and EMEA in AI security adoption - Osterman
Companies realise they need to improve the way they manage security and policy, and they also realise that automating workflows and processes is key.
Exclusive interview: RSA on the road to AI security
Organisations are now capable of leveraging AI as its advanced to the point of addressing critical issues in cybersecurity.
Data protection overlooked in race for digital transformation - IDC
Only with resilient operations can businesses mitigate the risk of downtime and focus on projects that drive transformation.
Is BYOD an expensive mistake for your business?
Security is one of the biggest issues with BYOD because of the security risk posed by consumer-grade phones.
Exclusive: MSSPs enabling holistic cybersecurity approach
“At the end of the day, two guys and security information and event management solution don't make a security operations center.”
Bringing a gun to a gunfight: Countering AI-enabled threats
Artificial intelligence can reduce human effort and lower the time needed to detect, respond to, and recover from cybersecurity incidents.
Exclusive: Cloud and blockchain threats creating new channel opportunities
While blockchain technology isn’t at the same maturity stage as cloud, the channel should start ramping up their security capabilities in that space.
Make the pre-emptive strike against cyberattacks with threat hunting
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.
Australian companies getting better at preventing focused cyberattacks
A study by Accenture found that only one in eight focused cyberattacks are getting through versus one in three last year.
Spending on AI cybersecurity solutions to increase – GlobalData
While cybersecurity has now become a critical business function, it remains a non-core competence for a significant number of boards.
Taking the right cybersecurity precautions in China - Cylance
China is already Australia’s largest import and export trading partner, and President Xi Jinping recently implied that it’s unlikely to slow down.
SailPoint forms board-level committee to drive cyber risk resiliency
“This board-level committee is us ‘walking the walk’ by staying on the pulse of the threat landscape.”
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?