TelcoNews Australia - Telecommunications news for ICT decision-makers

About Sara

Sara Barker mugshot photo
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.

Stories by Sara - Page 116

Thinkstockphotos 119354081

Brainwave! Brazilian man drives a Formula One car with his mind

Fri, 5th May 2017
#
driving
#
cognitive systems
Man drives Formula One racecar using only his mind in groundbreaking test by brainwear tech company Emotiv. #minddrivenracing.
Thinkstockphotos 503143840

Introducing the dawn of a radical approach to cyber risk management

Thu, 4th May 2017
#
ai security
#
risk & compliance
#
ai
It's time to think inside the box. Threat prevention offers the lowest risk, lowest cost and limited liability, according to experts.
Thinkstockphotos 674863094

Endpoint security can halt the ransomware scourge in its tracks

Thu, 4th May 2017
#
malware
#
ransomware
#
ai security
Ransomware is one of cybersecurity's biggest problems - attack volumes are skyrocketing by 100% every year and attackers are getting rich.
Ee4a48d3314f7cad67310d8f1aacc8cd original

Kickstarter project seeks to promote mental health through gaming heroes

Thu, 4th May 2017
#
gaming
#
digital entertainment
#
health education
A dedicated team is looking to create a breakthrough webseries that uses the power of video games to help those with mental illnesses.
Thinkstockphotos 531168680

Epic hacker fail: An exclusive look at the Netflix hack with ESET

Thu, 4th May 2017
#
malware
#
digital entertainment
#
cybersecurity
We chatted with ESET's senior research fellow Nick Fitzgerald for an expert's views on what the Netflix hack means for the future of streaming.
Thinkstockphotos 623982946

Turning digital data into a digital goldmine for business intelligence

Thu, 4th May 2017
#
data analytics
#
martech
#
planning
Businesses unlock their potential by transforming digital data into actionable insights, catalysing growth and innovation.
Thinkstockphotos 87357192

Global warning as spam attacks target stock market manipulation

Thu, 4th May 2017
#
spam
#
stock market
#
retarus
Sophisticated spam blitz threatens markets as Retarus flags a botnet's discreet bid to skew a Latvian stock's value.
Thinkstockphotos 668282828

Optus Business launches Cyber Education program for Australian students

Thu, 4th May 2017
#
cybersecurity
#
optus
#
skills shortage
Optus Business has launched a new Cyber Education program designed to encourage students to consider a career in cybersecurity.
Thinkstockphotos 528286738

Don't let Darth Vader destroy your security on World Password Day

Thu, 4th May 2017
#
cybersecurity
#
passwords
#
cyber policy office
If you use starwars100 as any of your passwords, now might be a good time to have a look at how strong your passwords actually are.
Thinkstockphotos 183708591

It's a game of risk: DDoS attacks intensify in 2017

Wed, 3rd May 2017
#
malware
#
ddos
#
cybersecurity
Distributed denial of service (DDoS) attacks are getting larger this year and it's now a game of risk, according to a new report from Neustar.
Thinkstockphotos 502880463

Gemalto puts final touches on 3M Identity Management acquisition

Tue, 2nd May 2017
#
biometrics
#
3m
#
gemalto
Gemalto has put the final touches on its acquisition of 3M's Identity Management Business - a deal worth $850 million.
Thinkstockphotos 517152588

Fight malware by spotting the top eight indicators of threat traffic in your network

Tue, 2nd May 2017
#
malware
#
siem
#
cybersecurity
There are eight main indicators that can help detect compromised networks. Here's how you can catch threat traffic before it cripples your systems.
Thinkstockphotos 637380670

LogRhythm's Network Monitor Freemium an impressive winner when put to the test

Tue, 2nd May 2017
#
storage
#
siem
#
dlp
Not all security tools have to come with a price tag. The SANS Institute takes at a look at LogRhythm's NetMon Freemium Version 3.2.3.
Thinkstockphotos 483815774

Is your healthcare data safe? Here are three ways to protect it

Tue, 2nd May 2017
#
network infrastructure
#
sdn
#
naas
Healthcare providers and healthcare systems have some of the most valuable information not only for patient health, but also for cyber attackers.
Thinkstockphotos 524816639

Are you ready? Only five weeks until China's new data security law comes into effect

Tue, 2nd May 2017
#
data protection
#
supply chain
#
law
With China's new cybersecurity law only five weeks away, businesses should be preparing and understanding the new rules.
Thinkstockphotos 531738031

Atlassian's workplace chat tool 'HipChat' affected by data breach

Tue, 2nd May 2017
#
breach prevention
#
cybersecurity
#
data breach
Workplace group chat tool HipChat has been hit by a data breach and users are being advised to check if they are vulnerable.
Thinkstockphotos 532528931

Criminals on a mission of ambition and disruption, says Symantec

Mon, 1st May 2017
#
malware
#
ransomware
#
email security
Ransomware attackers are increasing their ransoms; more emails are containing malicious links; and disruption is the word of the day.
Thinkstockphotos 669641714 2lohm3t

Dell survey: Australians better than most about sharing confidential information

Mon, 1st May 2017
#
network infrastructure
#
document management
#
ecm
Aussies awareness of data threats outshines global peers, yet Dell finds they're prone to share sensitive info under specific conditions.
Thinkstockphotos 472152276

It's not all about the network: How to protect your outbound data

Mon, 1st May 2017
#
brennan it
#
proxies
#
communication
Outbound data oversight a security Achilles' heel, warns IT expert Dayle Wilson, urging businesses to bolster defences.
Thinkstockphotos 531430677

TrickBot malware ramps up attacks against ANZ financial firms

Mon, 1st May 2017
#
malware
#
cybersecurity
#
ibm security
Attackers behind the TrickBot Trojan have been taking their tactics to the next level, researchers from IBM X-Force have uncovered.