New Zealand's leading source of cybersecurity and threat news
These search results are from across the Techday Network of sites
Survey: Rising role of IT in physical security provides opportunities
In addition to taking care of cybersecurity, IT departments are having to adapt to spearhead issues set forth by the physical security dept.
REPORT: An in-depth look into Japan’s largest data center markets
Structure Research recently published a 160 page study on the Tokyo and Osaka colocation data center markets – we’ve picked out the important bits.
Why APAC companies are undergoing digital transformation
Two-thirds of Asia Pacific services decision-makers report that their firm is currently undergoing digital transformation.
Report finds opportunities abound in the data center cooling market
Where there's data centers, there's heat, which means the cooling market will undertake rapid growth and innovation in the coming years.
How top CIOs prevent cyber threats
With malicious actors launching increasingly bold attacks, these are the top strategies CISOs use to fend off the danger.
UK most breached country in EU but businesses are blissfully naïve
A study has found that despite being the most breached country, UK businesses claim to actually feel less vulnerable than their European neighbours.
The AI difference: How chatbots gain and retain customers
Customers become emotionally invested and more loyal with brands that engage with them – but not all engagement methods are created equal.
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.
Whitepaper: How to make sure your security architecture keeps up with surging network speeds
The annual cost of cybercrime is expected to exceed US$6t by 2021 with a large contributor being the sheer amount of data that requires processing.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?