Techday Network
Sign in
Sign up
Specialist data centre news for Europe, the Middle East & Africa
Results:
Kai Ping Lew
These search results are from across the Techday network of sites
CSOs - are you prepared for cloud cryptojacking?
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
Vodafone releases phones with child-safe features
Along with the restriction capabilities, the Vodafone Smart N9 range also has a range of emergency and safety controls.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Threat prioritisation feature announced for Tenable platforms
Predictive Prioritisation enables organisations to focus on the three percent of vulnerabilities that have been or will likely be exploited in the next 28 days.
Massive jump in email fraud targeting healthcare - Proofpoint
The report analyses more than 160 billion emails sent across 150 countries in both 2017 and 2018 to identify email fraud attack trends.
The smart home tech that will be huge in 2019
For millennial home buyers, a generation for whom technology has been ever-present, smart systems are the features they value above everything else.
Citrix: How adoption of cloud apps is changing IT landscapes
The pursuit of agility, productivity and workforce mobility has added more systems, applications and services to the IT network of companies.
88% of businesses breached in the last year - Carbon Black
The report analyses survey results from different vertical sectors, organisation sizes and IT team sizes to build a picture of the attack and cyber defence landscape.
Experts comment on Aus Parliament breach
Late last week, Australian security agencies reported they were looking into a security breach of the Federal Parliament’s network.
Opinion: Reinventing cybersecurity with deep learning
Business continuity and financial damage are critical challenges for cybersecurity leaders today.
Security and mobility app adoption increasing - Okta
The fastest-of-the-fastest growing apps focus on identity-driven security, indicating that companies are taking Zero Trust seriously.
Email fraud increased by 476% in last year - Proofpoint
As these threats continue to grow in volume and sophistication, it is imperative that organisations implement a people-centric security approach.
Veritas strengthens AWS partnership with new competencies
Veritas NetBackup and Backup Exec now support multiple AWS storage classes.
Bug makes Android phones hackable via PNG image files
This means any application handling PNG files that have been carefully crafted by an attacker can end up running the attacker’s code.
Expert comment: Latest NDB report shows Aus is being targeted
The OIAC received 262 notifications in the three months, the highest number since the commencement of the NDB scheme.
Dell EMC expands multicloud data protection capabilities
According to IDC, 92% of organisations have adopted a cloud environment with 64% adopting a multi-cloud approach.
CrowdStrike opens endpoint protection platform to third-party apps
The CrowdStrike Store leverages the cloud for both scale and telemetry, enabling applications to deliver faster, smarter, and more effective solutions.
Interview: Inside the crybercriminal gig economy for bots
Techday spoke to Akamai Asia Pacific security technology and strategy head Fernando Serto about how organisations are being impacted.
Extreme Networks launches IoT security solution
IoT devices are typically deployed in a flat or unsegmented network so that if breached, the attacker can gain access to sensitive areas of the network.
Interview: Tenable CTO on how companies should measure cyber risk
Rising geopolitical tensions coupled with an expanding attack surface have left governments and organisations vulnerable to targeted attacks.
Compliance requirements driving better data management - 451 Research
90% of respondents in a 451 Research report say they will significantly increase investment in DataOps technologies this year.
1
2
3
4
5
…
Next ›
Last »