New Zealand's leading source of cybersecurity and threat news
These search results are from across the Techday network of sites
The potential of secure data storage and analytics
According to a recent study, the data industry still has a lot of untapped potential.
A/NZ businesses taking IoT security more seriously - MapR
53% of A/NZ companies now believe that keeping IoT secure is the greatest challenge they face in rolling out their IoT capabilities.
Top 10 challenges facing MSPs – and how to overcome them
In a perfect world all businesses would happily invest enough to protect their data, but it’s not, which is why Probax released a guide.
How to avoid major compliance problems
"With GDPR now in full effect, it is vital that businesses of all sizes protect the sensitive information they hold."
HPE simplifies hybrid cloud data protection with new solutions
HPE announced new hybrid cloud data protection and copy data management solutions for its intelligent storage portfolio.
Hitachi Vantara updates cloud platform to improve governance and data protection
Hitachi Content Platform (HCP) is an object storage platform that manages data as a key business asset and govern it with integrated security to reduce compliance risks.
Challenges in a new dawn of data protection - Commvault
Companies today are able to generate more data at a faster rate and it is more accessible to a larger number of users.
APJ customers don’t really trust companies with their data - report
40% of APJ business executives surveyed admitted to selling consumer data.
Leveling the playing field: Why clean data makes for clean elections
It may sound extreme, but when you consider that almost two years on we are still picking up the pieces of a U.S. election data scandal…
Synnex expands data protection portfolio for SMBs
Synnex Australia now offers Carbonite data protection to enhance its security offerings.
Six tips for improving data security in the healthcare sector
The stakes are high, given the fact that healthcare records contain a wealth of data, of the kind that can be used to perpetrate identify fraud.
Sophos new server security offering defends ‘cybercrime bullseye’
The new solution aims to protect and secure data at the most vital point - the server.
How chatbots can enhance the customer experience
"Gartner research suggests that by 2020, 85% of interactions will be handled by non-humans."
How every business can benefit from GDPR compliance
At its very heart, GDPR is all about protecting customer and employee data.
Developing a one-two punch for cloud security
When data is regularly accessed from a myriad of devices outside the corporate firewall, strategies to maintain effective security have to evolve.
Businesses collecting more data than they can handle - Gemalto
"Whether it’s selling it on the dark web, manipulating it for financial gain or to damage reputations, unsecured data is a goldmine for hackers."
Uganda data centre raided, operator ‘held hostage’
Concerning news has emerged of a data centre in Uganda that was raided forcefully without warning by government officials.
Why internal financial controls are more important than ever
Global research from BlackLine suggests that data is increasingly seen as one of a company’s most crucial assets, yet it's always at risk.
IBM and Commvault partner for simplified data protection
IBM Business Resiliency Services will offer its customers the opportunity to deploy Commvault software on-premises, in the cloud, and in data centres.
Small businesses don't ignore the GDPR; it matters now
Any company that's doing business in Europe will be subject to the GDPR, including companies based in a foreign country.
How to get the right kind of control over your cloud
Trust in the cloud hasn’t always been universal.
GDPR, changing what it means to be a good data custodian
One of the key elements of the GDPR is that it empowers citizens to have a voice in how their data is used.
Apple reportedly taking steps to crack down on iPhone unlockers
Apple is reportedly taking a stand against those who use phone unlockers to access data on iPhones,
Vulnerability, breach, and patch: Break the vicious cycle
Deploying static defences against a continually evolving attacker makes no sense.