Technology
Trend Micro (Dr Jon Oliver) commentary on Census 2016 hacking
Says Dr Jon Oliver, senior architect at Trend Micro: “I have complete confidence that the…
How to harness cloud without the bill shock
Lowering the total cost of cloud ownership (TCCO) is becoming a priority for most organisations…
Fujitsu ICT Contributes to Approximately 40 Million Ton Reduction in Greenhouse Gas Emissions
Fujitsu has announced the publication of the Fujitsu Group Environmental Report 2016. From fiscal 2013 through…
Check Point Researchers Uncover ‘QuadRooter’ Vulnerability Affecting Over 900M Android Devices
Four newly discovered Android vulnerabilities can give attackers complete control of devices and access to…
A West African Cyber Threat
“Nigerian prince” and “419” scams have plagued victims for decades and transitioned to the Internet…
Statistics New Zealand streamlines data collection with cloud-based Enterprise Collection Platform
Statistics New Zealand is working with technology company Fronde to implement an enterprise-wide system built…
Check Point Introduces First Real-Time Zero-Day Protection for Web Browsers
New SandBlast Agent for Browsers prevents the latest web-based malware,phishing and credential theft attacks Preliminary…
Ping Identity Acquires UnboundID to Deliver the Leading Customer Identity and Access Management Solution
Acquisition to accelerate how enterprises acquire, engage, manage and retain customers across all channels Ping…
CREST Singapore Chapter Established to Introduce Penetration Testing Certifications and Accreditations in Singapore
CREST examination facility officially opened at the Singapore Institute of Technology In partnership with the…
Check Point Launches Australia and New Zealand Technical Assistance Centre and Incident Response Services
Check Point Software Technologies has launched a Technical Assistance Centre (TAC) in Melbourne to enhance in…
Netevents APAC summit review
Innovation in the Cloud – Enterprise is ready but is the Cloud ready for the…
Tinder safe dating spam uses safety to scam users out of money
Norton by Symantec has uncovered that scammers are leading Tinder users to funnel affiliate money…
ISACA Challenges Mobile Payment Security Perceptions
New guide shows mobile security advantages over traditional payment methods Advancements in mobile payment security…
How cloud infrastructure is making enterprise IT more secure
While organisations have long been aware of cloud’s ability to reduce costs and increase agility,…