Specialist data center news for Asia
These search results are from across the Techday Network of sites
The potential of secure data storage and analytics
According to a recent study, the data industry still has a lot of untapped potential.
Unintended recipients: The minor action causing major compliance problems
"With GDPR now in full effect, it is vital that businesses of all sizes protect the sensitive information they hold."
Leveling the playing field: Why clean data makes for clean elections
It may sound extreme, but when you consider that almost two years on we are still picking up the pieces of a U.S. election data scandal…
Six tips for improving data security in the healthcare sector
The stakes are high, given the fact that healthcare records contain a wealth of data, of the kind that can be used to perpetrate identify fraud.
How chatbots can enhance the customer experience
"Gartner research suggests that by 2020, 85% of interactions will be handled by non-humans."
Developing a one-two punch for cloud security
When data is regularly accessed from a myriad of devices outside the corporate firewall, strategies to maintain effective security have to evolve.
Businesses collecting more data than they can handle - Gemalto
"Whether it’s selling it on the dark web, manipulating it for financial gain or to damage reputations, unsecured data is a goldmine for hackers."
Why internal financial controls are more important than ever
Global research from BlackLine suggests that data is increasingly seen as one of a company’s most crucial assets, yet it's always at risk.
How to get the right kind of control over your cloud
Trust in the cloud hasn’t always been universal.
GDPR, changing what it means to be a good data custodian
One of the key elements of the GDPR is that it empowers citizens to have a voice in how their data is used.
Apple reportedly taking steps to crack down on iPhone unlockers
Apple is reportedly taking a stand against those who use phone unlockers to access data on iPhones,
Vulnerability, breach, and patch: Break the vicious cycle
Deploying static defences against a continually evolving attacker makes no sense.
Singapore welcomes new player in enterprise data security space
“We are excited about the opportunity Asia Pacific presents to Protegrity and look forward to working with the region’s leading organizations."
Key takeaways from Privacy Awareness Week: Experts comment
Cybersecurity experts from Sophos, Trend Micro, CyberArk, Mimecast, Bitglass & others share their thoughts on privacy and what it means for security.
Privacy Week interview: Aura Information Security's Peter Bailey
I spoke to Aura’s general manager Peter Bailey to get his take on Privacy Week, data security, and why privacy is everyone's responsibility.
Privacy Week: 79% of Kiwis concerned about businesses that share their personal info
Those on a lower income of $55,000 or less were more likely to be concerned about privacy (77%) than those with higher incomes (63%).
A four-step-plan towards cloud resilience in an age of data security
The ramifications of having a data breach are ten-fold for government agencies who handle sensitive information.
Reduce risk in the enterprise by digitising documents
Relying on paper documentation is one of the largest gaps an enterprise faces, and also one of the hardest to police.
Now or never: Don’t get left behind in the race to GDPR compliance
Those who don’t comply will face huge financial penalties and are likely to be held publicly accountable for any misuse of customer data.
How data security could help you avoid NDB breach reporting
If you don't understand NDB, you may face substantial penalties including fines, lost customers and increased risk of future data breaches.
Interview: IBM New Zealand's John Martin talks GDPR, NZ's Privacy Act, and Australia's NDB laws
“Find out where the data is, what controls you have and what risks you have. There are going to be a few surprises.”
Data Republic and SAS collaborate on secure data sharing & analytics platform
The latest partnership with SAS is what McCarney says was a logical step for the company’s growth.
Federal Govt & Defence sectors launch secure IT lifecycle services facility in Canberra
Emphasis on the secure management of sensitive IT assets from imaging to disposal of extremely-sensitive data has generated significant interest.
Beyond the breach: How to preserve your customers’ trust
Transactions happen online between two entities that will never see each other. This means trust matters even more as physical interactions disappear.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.