Technology news for Australia's largest enterprises
These search results are from across the Techday Network of sites
Trend Micro’s four pillars of cybersecurity strategy
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
Competition: Help Kiwi kids celebrate the good side of the internet
Trend Micro’s What’s Your Story? Is a fun poster competition for kids aged between 5-12 years. They can design a poster that reflects the good side of the internet in whatever creative ways they come up with.
Kiwi kids and parents work together to create a safer internet
The competition is an initiative by Trend Micro to reframe some of the negative connotations around internet safety.
Why cybercriminals are moving away from attention-grabbing ransomware attacks
Crypto-jacking attempts are making the biggest impact so far this year.
Trend Micro brings analytics to network security solution
Organisations need a way to simplify and prioritise threat information, accelerating detection and response.
Businesses disregarding the risk of an IoT breach – survey
Despite facing a growing threat landscape, only 53% of 1150 IT decision-makers surveyed cite IoT as a security risk.
How do you secure a home that’s smarter than you?
Some envision a truly connected home as “utopia”, whereas others are more sceptical of the convenience smart devices promise.
Trend Micro named leader in endpoint security by Forrester
Key criteria for the current offering includes malware and exploit prevention, behavioural detection, and product performance.
Trend Micro extends container security solution to work at the speed of DevOps
Deep Security Smart Check identifies security issues prior to deployment with container image scanning.
Catching up on the new breed of digital extortion
Digital extortion is cheap and easy to commit. Its victims also tend to pay up without involving the police.
The basics of data encryption: What you need to know
To ensure top notch security it’s necessary to understand the following best practices when deploying and utilising encryption.
Going beyond antivirus with Trend Micro's Maximum Security
With the widening scale of cyber threats targeting consumers, its crucial that our security solutions simultaneously protect every type of device.
A new twist on an old phish: Apple scams now using encryption
Trend Micro recently deconstructed a new phishing scam that targets Apple IDs and uses AES encryption as part of its processes.
Key takeaways from Privacy Awareness Week: Experts comment
Cybersecurity experts from Sophos, Trend Micro, CyberArk, Mimecast, Bitglass & others share their thoughts on privacy and what it means for security.
Antivirus solution protects privacy in the era of social media
What measures are you taking to secure your social media accounts?
Arm your battle stations: Ransomware is growing like the plague
‘Your files have been encrypted. You have 24 hours to pay or your data will be destroyed’.
Why mandating strong cybersecurity for your remote workforce matters
Employees who use unprotected public or home internet connections are putting their organisation, networks, assets, and intellectual property at risk.
34 tech heavyweights stand strong: Protecting the globe from cyber threats
Not only with the companies protect customers, they've also vowed not to help governments who want to go on the cyber offensive.
The way you write your emails could now stop BEC scams, thanks to AI
The way people write their emails could be the new weapon that detects malicious email threats - and that’s exactly what Trend Micro is counting on.
OceanLotus backdoor targets MacOS systems running PERL
The OceanLotus backdoor is now targeting MacOS systems in its latest spate of attacks.
One year on, the WannaCry scare hasn't made healthcare security any better
Connected hospitals can be exploited – and researchers believe that the WannaCry scare has only made matters worse.
Canalys says SECaaS growing rapidly, while vendors struggle to keep up
The company says the increase is due to the technology’s multiple advantages compared to software licensing.
Finally! Your very own AI chief of security
Every day a piece of science-fiction becomes real. Today, it's a cybersecurity offering that learns how to protect you without straining your CPU.
Is there an answer for soaring numbers of cyberbullying cases?
In the wake of the mass digitisation taking homes by storm, cyberbullying and online harassment has accelerated 60 percent with no signs of slowing.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?