Technology news for Australia's largest enterprises
IT risk and compliance
These search results are from across the Techday network of sites
New research highlights third party risks facing organisations
modern risk management must account for ongoing changes in third-party relationships and mitigate risks in an iterative way — that is, on a continual basis, rather than at specified intervals."
RSA responds to increasing A/NZ regulations with new updates
The new data protection and privacy management capabilities will help business in the A/NZ region to better ensure data protection and privacy regulations and compliance, according to the company.
Auxilion launches new cybersecurity risk assessment service
Auxilion’s Cybersecurity Risk Assessment service (CRA), will identify any vulnerabilities within an organisation from a technology, human and compliance perspective.
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Change is coming for popular Windows products
Microsoft wants to ensure that your business is well-supported during the upgrades, which is why it is offering a range of options to help you transition.
Rackspace puts focus on data protection & compliance with newest offering
Managed cloud provider Rackspace has moved further into the cybersecurity market with a new data protection and compliance solution.
Center for Internet Security recognises Kiwi compliance firm
A New Zealand security assessment and compliance system has received recognition from the US-based Center for Internet Security (CIS).
Security firm Cyber Toa launches virtual CISO for Kiwi businesses
Wellington-based security company Cyber Toa launched the virtual CISO last week to help Kiwi businesses battle the torrent of cyber threats.
WannaCry shines spotlight on data privacy and compliance regulations
In the case of a ransomware attack, the liability and consequences to victims can often stretch far beyond the results of lost data.