Specialist data centre news for Europe, the Middle East & Africa
These search results are from across the Techday Network of sites
You’re invited: Getting proactive about security - an Empired webinar
We all know that proactive security is the best security, but what does that look like? Don’t miss your chance to find out.
What you need to know about cyber threats
"Cyber security is no longer an issue the IT department is solely responsible for – it’s now an organisation-wide priority."
NSW government's new cyber security strategy
"The strategy is aimed at boosting public sector capability across government departments and agencies."
How Gemalto aims to ensure the future of IoT
DigiCert, Gemalto, and ISARA announced a partnership to develop advanced quantum-safe certificates for IoT devices
Multifactor Authentication: Is it still enough on its own?
"MFA has become a popular weapon in the ongoing battle against cybercrime, but is it still enough on its own?"
Remote administration tools bring unexpected threats to industrial networks
According to a report published by Kaspersky Lab ICS CERT, RATs are incredibly widespread across all industries.
For businesses, data is the new currency, but it’s vulnerable
"The value data holds for a business and its impact on the bottom line has grown."
Have your say: Govt extends feedback deadline for Cyber Security Strategy refresh
“There’s been strong interest in the Cyber Security Strategy refresh and we want to ensure we have a broad range of perspectives," says Clare Curran.
Getting up to speed: five EOFY tips to improve your IT security
It's time to tally the numbers, tidy the books and check in on your IT infrastructure.
Brennan IT tapped as AusCERT’s member organisation of the year
The award recognises that Brennan IT fixed the largest percentage of vulnerabilities reported through AusCERT's MSINs.
Fujitsu develops network control technology to minimize impact of cyber attacks
Fujitsu Laboratories announced the development of network control technology that can securely operate IoT devices installed on-site.
YOU’RE INVITED: CeBIT 2018 - Sydney
As the largest and longest-running B2B conference in the APAC region, CeBIT is certainly not an event to be missed.
The Internet of Broken Things? Seven key facts about IoT
While most ransomware attacks currently infiltrate an organisation via email, IoT presents a new delivery system for both mass and targeted attacks.
Interview: Cisco on its partner community and intent-based networking
A look how Cisco's partners have reacted to the company's intent-based networking push and how they can keep up with customer demand.
Carbon Black brings 80 tech partners together for new security integrations
The Carbon Black Integration Network (CbIN) has seen the likes of Juniper Networks, LogRhythm and Phantom building integrations with Cb's PSC.
SonicWall unveils new MSSP program to build partners’ security offerings
The program is designed to allow partners to fill their customers’ widening security skills gap by building their managed security service offerings.
Unisys teams up with Cylance to offer managed security services with endpoint protection
“In teaming with Cylance, we help clients leverage AI and machine learning on their endpoint, as well as automation of management activities."
Malicious 'bad bots' account for more web traffic than ever before
4% of bad bot traffic is made up of moderate or sophisticated bots, which evade detection by distributing their attacks over multiple IP addresses.
Senetas enters technology partnership and distie agreement with ADVA
“By combining ADVA’s Ensemble suite with Senetas’ virtual encryption engine, we can offer a solution for site-to-site and site-cloud encrypted VPNs.”
Cylance recognises top local partners at APAC partner advisory council
Cylance says the awards recognise the instrumental role their partners have played in driving its recent APAC growth figures.
RSA launches 'risk quantification' tools so CISOs can convince boards that security is important
“Most often, important business questions such as ‘are we doing enough?’ and ‘are we spending too much or too little?’ get unsatisfactory responses."
Q&A: Darktrace explains how AI influences cybersecurity
“Without AI, cybersecurity doesn’t have a hope of coping with inevitable digital growth.”
Hosted Network partners with NetCrypt to provide all-in-one data security solution
The solution is an answer to Australia's data breach notification law which came into effect in February.
EXCLUSIVE: Continuum leaders share insights on state of cybercrime
We were able to catch up with two of Continuum's executives after its sold out European Partner day - they both see danger ahead for SMBs.
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."