
ITP TECHBLOG
Category
- AI
- Advocacy
- Big Tech
- Careers
- Cartoons
- Climate Change
- Course
- CyberSecurity
- Democracy
- Diversity
- Education
- Events
- Getting Started
- Government
- ITP News
- Immigration
- Industry News
- Innovation
- Interview
- Legal
- Membership
- Mental Health
- Navigating Change
- Regional Spotlight
- Regulation
- Security
- Skills
- Society
- Telecommunications
- Volunteer
- Women in technology
- advice
- bridging the gap
- ethics
- growing the industry
- industry news
- innovation
- tech talk
FMA demanding stronger cyber reporting and tech resilience
The new condition will come into effect on July 1 and require a licence holder to have a business continuity plan in place suitable for the size and scope of the business.
Griffin on Tech: War of words over hacking heats up - but is it news?
It would be helpful if the PR campaign against China was supplemented with a decent investment at a natonal level in cybersecurity, an area we have woefully underspent in as a nation.
A close call for the Linux community as major vulnerability detected
The big question now is who created the malware and what was their motivation for creating a security backdoor that could have compromised computer systems all over the world if it had been introduced into operating environments.
Facing a wave of scams, Spark beefs up its cybersecurity offerings
Telecommunications provider Spark will next month launch a SMS “scam firewall” for its mobile customers which will automatically detect known fraudulent text message content
20% of NZ cybersecurity incidents relate to cloud platforms - Kordia
There are lingering perceptions that the cloud is more secure than more traditional on-premises systems. While there are certainly benefits that can be leveraged from the cloud, without the right security layers, businesses are just as exposed.
Are private conversations truly private? A cybersecurity expert explains how end-to-end encryption protects you
While end-to-end encryption effectively secures messages, it is not foolproof against all cyberthreats and requires users to actively manage their privacy settings.