TelcoNews Australia - Telecommunications news for ICT decision-makers

About Kai Ping

Kai Ping Lew mugshot photo
Kai Ping Lew
Editor-in-Chief & News Editor - Security
KP was raised in Malaysia and graduated with a degree in Journalism and International Business at AUT. After graduating, she did a stint in broadcast media at TVNZ before deciding to return to her true love, the written word. In her spare time, KP enjoys exploring fictional universes through books, spending time in the sun, playing volleyball, and dancing.
Former TechDay team member.

Stories by Kai Ping - Page 6

Data centre3

Okta announces security layer for on-prem apps

Wed, 3rd Apr 2019
#
hybrid cloud
#
cloud security
#
iaas
Okta debuts Okta Access Gateway at Oktane19, enhancing secure single sign-on for on-premises applications. Set for release later this year.
Ai2

Okta launches risk-based authentication with machine learning

Wed, 3rd Apr 2019
#
mfa
#
iam
#
ai
Okta has unveiled a new risk-based authentication system at Oktane19, leveraging machine learning for enhanced security and seamless user experiences.
Code1

Okta enables developers to create unlimited platform integrations

Wed, 3rd Apr 2019
#
iam
#
open source
#
cybersecurity
Advanced development functionality provided by Hooks opens the Okta Integration Network to a wide array of new types of custom, secure integrations.
Network security copy

Okta brings centralised identity security to servers

Wed, 3rd Apr 2019
#
datacentre infrastructure
#
mfa
#
cloud security
Okta unveils Server Access tool for safer management of cloud infrastructures, enhancing security with Zero Trust.
Cybersecurity layers

Okta introduces customisable building blocks for identity verification

Wed, 3rd Apr 2019
#
iam
#
passwordless
#
cybersecurity
Passwordless authentication, progressive profiling, per-app branding and unlimited use cases are now possible with the Okta Identity Engine.
Justice3

Salesforce accused of sex trafficking in lawsuit by 50 women

Thu, 28th Mar 2019
#
data analytics
#
hyperscale
#
public cloud
The 50 'Jane Does' allege that Salesforce built customised services for the web forum Backpage while publicly boasting about fighting sex trafficking.
Cybersecurity3 copy

Developing APAC countries most vulnerable to malware - Microsoft

Fri, 22nd Mar 2019
#
malware
#
ransomware
#
cybersecurity
The Asia-Pacific region remains a prime target for cybercriminals, according to Microsoft's Security Intelligence Report.
Telecommunications3

NZ ISPs issue open letter to social media giants to discuss censorship

Tue, 19th Mar 2019
#
uc
#
google
#
facebook
Three of New Zealand's largest ISPs urge Facebook, Twitter, and Google to discuss solutions for preventing the spread of violent content online.
Screen shot 2019 03 19 at 10

Unencrypted Gearbest database leaves over 1.5mil shoppers' records exposed

Tue, 19th Mar 2019
#
data analytics
#
martech
#
planning
A breach at Gearbest has left over 1.5 million shoppers' records exposed, including payment details and national IDs, due to an unencrypted database.
Adobesummit2018 013

Digital experience managers, get excited for Adobe Summit 2019

Fri, 15th Mar 2019
#
crm
#
digital transformation
#
cx
Adobe Summit 2019 promises to be bigger and better than last year's, with speakers including Microsoft CEO Satya Nadella and actress Reese Witherspoon.
Screen shot 2019 03 14 at 9

Kathmandu breached, customer information accessed

Thu, 14th Mar 2019
#
breach prevention
#
cybersecurity
#
data breach
Kathmandu is notifying potentially affected customers directly and has advised them to change their passwords for its online loyalty programme.
Access card

Why it's time to move ID card issuance to the cloud

Tue, 12th Mar 2019
#
physical security
#
iam
#
cybersecurity
As traditional ID card issuance methods become outdated and insecure, moving to cloud-based solutions offers increased flexibility, security, and efficiency.
Sara kurfess 794955 unsplash

Cybercriminals earning over $3billion annually exploiting social platforms

Mon, 11th Mar 2019
#
cybersecurity
#
social media
#
cybercrime
Cybercriminals exploiting social media platforms rake in over USD $3 billion annually, a study sponsored by Bromium and led by the University of Surrey reveals.
Endpoint security2

Trend Micro on how organisations are navigating endpoint threats

Fri, 8th Mar 2019
#
endpoint protection
#
breach prevention
#
edr
TechDay spoke to Trend Micro market strategy global VP Eric Skinner about key threats organisations are currently facing and the best way to mitigate them.
Woman professional copy

Where to from here? Women in cybersecurity speak up

Fri, 8th Mar 2019
#
iwd
#
dei
#
solar power
Women in cybersecurity discuss challenges from gender pay gaps to toxic workplaces on International Women's Day, urging for a more gender-balanced industry.
Screen shot 2019 02 27 at 2

Gallery: Seagate's Singapore R&D facility pioneering storage innovations

Wed, 27th Feb 2019
#
storage
#
seagate
#
solar power
The Shugart was completed in June 2015, spanning 440,000 square feet and capable of housing approximately 850 employees.
Screenshot 2019 02 24 at 12

Hands-on Review: Samsung Galaxy S10 goes up against the Huawei Mate 20 Pro

Fri, 22nd Feb 2019
#
gaming
#
digital entertainment
#
samsung
While these two phones appear to be unlikely competitors, the fact that retail at the same price point pits them directly against one another.
Untitled design

Surprises and highlights from Samsung's Unpacked launch event

Thu, 21st Feb 2019
#
samsung
#
samsung galaxy
#
tablets
The event features devices that are Samsung's answer to skeptics who say everything that can be done has already been done.
Img 1061

Seagate: Data trends, opportunities, and challenges at the edge

Wed, 20th Feb 2019
#
data analytics
#
hyperscale
#
martech
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Identity and access management3

Exclusive: Ping Identity on security risk mitigation

Tue, 19th Feb 2019
#
uc
#
mfa
#
multi-cloud
As data breaches surge, Richard Bird of Ping Identity discusses how organisations can tailor security measures to mitigate unique cyber risks in the cloud era.