Australia's leading source of security and threat news
These search results are from across the Techday Network of sites
Silent authentication may be the next best thing for last-mile delivery
While most conglomerate merchants now offer decent delivery options, improvements remain to be made.
Four Major Misunderstandings about public key infrastructure (PKI)
There’s a misconception that public key infrastructure (PKI) is dead.
Facebook & Amazon have better authentication methods than enterprises, say IT pros
Facebook and Amazon may have better authentication methods than the average enterprise, some IT professionals believe.
Australia's Digital ID framework is now one step closer to reality
“We believe that it should be safe and easy for everyone to prove who they are. This means giving people a secure option to verify their identity."
Done deal: LexisNexis and ThreatMetrix fight fraud as one
"The marketplace recognises us for developing and leveraging technology and advanced analytics to innovate fraud solutions that protect society."
ThreatMetrix to merge with LexisNexis Risk Solutions after $1 billion buyout
Global analytics provider RELX Group has paid £580 million (AU$1.01 billion) to buy out the entire issue share capital of ThreatMetrix.
Auckland firm Verifi to provide online ID services for Lotteries Commission
Auckland-based identity verification firm Verifi will now provide services for the New Zealand Lotteries Commission for online age verification.
Fujitsu rolls out biometric palm vein authentication in Japan offices
Fujitsu is rolling out its biometric palm vein authentication solutions within its own company to replace passwords used by around 80,000 employees.
Gartner’s ten predictions for smartphone AI developments
Analysts predict 80% of smartphones shipped will have on-device AI capabilities by 2022.
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.
Whitepaper: How to make sure your security architecture keeps up with surging network speeds
The annual cost of cybercrime is expected to exceed US$6t by 2021 with a large contributor being the sheer amount of data that requires processing.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?