Check out the latest events and activities from Connect Smart and our Partners.
Riley Reid, ARC Solutions | 31 October 2017
Mobile networks and mobile phones are an important and ubiquitous part of New Zealanders’ personal and working lives. In Aotearoa , around 95% of mobile phones sold are now smartphones. More people access the internet on a smartphone than any other device.
Oliver Barrett | 31 October 2017
The Internet of Things (IoT) describes the growing number of physical devices that are being connected up to the internet, the platforms that control them and the networks which give them connectivity.
Associate Professor Ryan Ko – University of Waikato | 31 October 2017
When we upload files into cloud storage or when we process and create data into the cloud, we immediately lose control of our data. Most of the time, we will not know where our data will be stored, or how many copies of the data are created.
Amy Corkery, NCPO | 31 October 2017
Associate Professor Ryan Ko – University of Waikato | 31 August 2017
David Eaton - Cyber Security Consultant and Chair of the Cyber Security Skills Taskforce | 31 August 2017
03 August 2017
Craig Dore, Senior Identity Architect, Asia Pacific, RSA | 29 June 2017
In today’s business environment, there’s a rapid shift that has been underway for the last decade, one which embraces two themes: the shift to cloud and the shift to mobility. These two themes provide clear value when applied to corporate IT.
Kevin Wu, Principal Security Consultant, Quantum Security | 29 June 2017
Mobile devices have increasingly become an essential part of our everyday lives. Our phones are no longer just a device for making calls or sending text messages. We rely on them for wider communication, transaction, navigation, media, Internet, lifestyle applications and more. Quantum Security
Chris Chong – SafeStack | 26 May 2017
Phishing attacks continue to evolve and are becoming more complex, sophisticated and harder to detect. Attacks are also increasingly targeted at individuals and organisations with the intent of not only accessing your data and/or stealing your money, but also infecting your systems with malware.