Australia's leading source of security and threat news
These search results are from across the Techday network of sites
How to make your smart home safe when hackers are looming nearby
The more devices you connect to your network the more you need to protect, your data may be at risk...
21 Aug 2017
The new tenets of effective threat protection
An IoA highlights the need to change focus from what already happened within your network to looking at potential issues as they happen.
07 Aug 2017
Gather around the watering hole: Bronze Union attackers likely based in China
The 'active and formidable' Bronze Union group has been responsible for a spate of targeted attacks on Turkey - how do they do it?
04 Jul 2017
Free the network: Four reasons to build your network with SD-WAN
Digital transformation is only as effective as the network that underpins it.
26 Jun 2017
Exclusive: VMware's Bruce Davie explains why network virtualisation is changing security
Security is not about the perimeter any more. Not when you have applications virtualised in the cloud, each with their own policies.
19 Jun 2017
How to find out the true value of network risk reduction
Networks may make up part of business infrastructure growth, but how do businesses make the most out of any new network & security monitoring tools?
19 Jun 2017
Top tips to secure your home wifi network from net nasties
Your home internet network is become more and more vulnerable. Here's what you can do to help protect it from hackers and other net nasties.
13 Jun 2017
Nokia's latest Threat Intelligence Report: Smartphone malware skyrockets 400%
Malware infections on smartphones rose nearly 400% in 2016, according to the latest Threat Intelligence Report from Nokia.
28 Mar 2017
Ixia survey finds network complexity is weakening enterprise security
IT networks that are too complex may be the downfall of organisations' security, new study by Ixia finds.
27 Mar 2017
Could deception methods be the new answer to cybersecurity?
Firms are unable to detect attackers for almost five months once they are inside systems, but deceiving attackers along the way can slow them down.
27 Feb 2017
Trend Micro's lowdown on the bug that puts Windows systems at risk of DoS attacks
“Upon discovery, the bug was initially graded with a severity level of 10 out of 10, which means that the vulnerability could easily be exploited."
07 Feb 2017
Your printer is a ‘weak link’ and putting your organisation at risk right now
Print security is once again in the spotlight, after new research revealed that 61% of enterprises have suffered an insecure printing data breach.
25 Jan 2017
Ixia's Singapore Executive Briefing Center a safe haven for cyber defence simulations
“The Ixia Executive Briefing Center is unique and a highly valuable offering for IT professionals who struggle to run real-time stress-testing."
07 Dec 2016
Fortinet’s Security Fabric: Protection for the entire data centre
Data centres need protection from a variety of all-to-real threats. Fortinet has security solutions for the edge, the core and into the cloud.
27 Sep 2016
Business continuity: A key benefit of Fortinet’s network security
You sell goods and services. You need a safe and secure network to keep the revenue coming in. Fortinet’s network security keeps the wheels turning.
26 Sep 2016
Fortinet extends network security into optimised operations
Fortinet’s security fabric moves beyond the firewall into enhanced network management, more visibility and reduced risk. Ingram Micro explains how.
21 Sep 2016
Selling enterprise security solutions - tips for success
Ingram Micro’s Andrew Khan shares proven sales strategies for demonstrating return on investment when pitching security solutions to NZ businesses.
20 Sep 2016
Expert opinion: What you can’t see could kill your network
CIOs & network admins often view the network as an inhibitor to achieving the business agility they recognize as vital to digital transformation.
19 Sep 2016
Your school's endpoint security: Solving the BYOD conundrum
BYOD is both an enabler and a risk. Ingram Micro can show you how Fortinet’s internal segmentation technology makes BYOD safer and more secure.
19 Sep 2016
Can you detect advanced threats with just Flows/IPFIX?
Is this enough to detect “an advanced threat”? Before you jump to conclusions, let’s have a productive discussion here.
01 Aug 2016
Malware isn't the problem -it's the legitimate tools you should be worried about
Forget malware - once attackers are inside your system, 99% of post-intrusion internal attacks originate from leveraging legitimate applications.
04 Jul 2016
7 modern security problems you can solve with Encrypted Traffic Management
Blue Coat has identified a few challenges plaguing security and network teams and how the right Encrypted Traffic Management solutions can help.
09 Jun 2016
Network blind spots and what you should do about them
“Being proactive with installation, maintenance and ongoing training related to IT infrastructure helps overcome potential threats."
03 Jun 2016
The best way for IT pros to save themselves time
One of the most efficient ways to lighten the workload is to invest in educating employees about IT security.
14 Mar 2016