Insights

Informatica’s new data management clouds target health, finance services

Just after launching a focused data management platform for retail customers in March, enterprise data management vendor Informatica has now released two more industry-specific versions...

Let’s meet! Virtually, in-person, or somewhere in between?

The United States seem to have a love/hate relationship with video conferencing. Almost everyone has used it (or at least 81%, according to the Pew...

CIO Leadership Live with Head of ICT Iain Boyd of ANZCO Foods

Cathy O’Sullivan is Editor for CIO New Zealand, based in Auckland. Cathy has worked in digital, print and broadcast media for almost two decades in...

Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service

Rapidly accelerated digital transformation strategies over the last few years only cemented what digital identity architects already knew: identity is the perimeter. While protecting enterprise...

Don’t Get Caught with Your Door Unlocked

The case for Zero Trust security has never been clearer than it is today. Workflows are increasingly happening in the cloud, hybrid work is becoming...

Trending News

Common NFT scams and how to avoid them | WeLiveSecurity

As NFTs exploded in popularity, scammers also jumped on the hype. Watch out for counterfeit NFTs, rug pulls, pump-and-dumps and other common scams plaguing the...

Cryptocurrency: secure or not? – Week in security with Tony Anscombe | WeLiveSecurity

When you hear the term ‘cryptocurrency’, does ‘secure’ also spring to mind? Here are some implications of the lack of sound security practices in the...

Sandworm uses a new version of ArguePatch to attack targets in Ukraine | WeLiveSecurity

ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks Sandworm, the APT group behind some of the...

The flip side of the coin: Why crypto is catnip for criminals | WeLiveSecurity

Cybercriminals continue to mine for opportunities in the crypto space – here’s what you should know about coin-mining hacks and crypto theft Wherever you look...

Fake news – why do people believe it? | WeLiveSecurity

In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real Every...

The downside of ‘debugging’ ransomware | WeLiveSecurity

The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their...