Alerts/News

Check out the latest events and activities from Connect Smart and our Partners.

 

 

Riley Reid, ARC Solutions | 31 October 2017

Keeping Safer on Mobiles

ARC Logo www.arcsolutions.com.au 300 x 300

Mobile networks and mobile phones are an important and ubiquitous part of New Zealanders’ personal and working lives. In Aotearoa , around 95% of mobile phones sold are now smartphones. More people access the internet on a smartphone than any other device.

Oliver Barrett | 31 October 2017

Security for the Internet of Things

The Internet of Things (IoT) describes the growing number of physical devices that are being connected up to the internet, the platforms that control them and the networks which give them connectivity.

Associate Professor Ryan Ko – University of Waikato | 31 October 2017

Returning Data Control to Users with STRATUS

When we upload files into cloud storage or when we process and create data into the cloud, we immediately lose control of our data. Most of the time, we will not know where our data will be stored, or how many copies of the data are created.

Amy Corkery, NCPO | 31 October 2017

Self-Driving Cars, Robots – and Paperclips? Artificial Intelligence and its Implications

Universal Paperclips (http://www.decisionproblem.com/paperclips/index2.html) is a new game sweeping the world’s offices, and to describe it as ‘addictive’ would be an understatement. Consider yourself warned. You start by clicking a button that makes a paperclip. You can spend money on marketing, ad...

Associate Professor Ryan Ko – University of Waikato | 31 August 2017

Turning the Tide with Cyber Toolmakers (a.k.a. computer scientists)

Think about this: A unique malware is created every half a second[1], but it takes companies on average 100-120 days to patch critical vunerabilities[2]. Some may say that the crux of the cyber security problem is skills shortage, while others lament the rigidity of corporations versus the abilities...

David Eaton - Cyber Security Consultant and Chair of the Cyber Security Skills Taskforce | 31 August 2017

Growing the Pipeline of Cyber Security Talent

The market reality        According to most estimates, the demand for cybersecurity workers far exceeds supply. Evidence from the Centre for Cyber Safety and Education (formerly the ISC2) Global Information Security Workforce study in 2015 which surveyed over 14,000 global organisations, estimated ...

03 August 2017

NZ and Australian businesses send cyber delegation to Israel

  One of the most important parts of heading away to visit and learn from another country is that you tend to learn more about your own country in doing so.   Israel is impressive in many ways: its cyber security firms lead the world, and are some of the largest in the world (such as Check Point). B...

Craig Dore, Senior Identity Architect, Asia Pacific, RSA | 29 June 2017

The Security Challenges of Mobility – RSA

RSA Logo Red

In today’s business environment, there’s a rapid shift that has been underway for the last decade, one which embraces two themes: the shift to cloud and the shift to mobility. These two themes provide clear value when applied to corporate IT.

Kevin Wu, Principal Security Consultant, Quantum Security | 29 June 2017

The Mobile Movement – Quantum Security

Quantum security logo

Mobile devices have increasingly become an essential part of our everyday lives. Our phones are no longer just a device for making calls or sending text messages. We rely on them for wider communication, transaction, navigation, media, Internet, lifestyle applications and more. Quantum Security

Chris Chong – SafeStack | 26 May 2017

Catch a Phish – Safestack

SafeStack image

Phishing attacks continue to evolve and are becoming more complex, sophisticated and harder to detect. Attacks are also increasingly targeted at individuals and organisations with the intent of not only accessing your data and/or stealing your money, but also infecting your systems with malware.

1 2 3 4 5 6 7 8 9