About Sara
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.
Stories by Sara - Page 148
CyberArk talks credential privileges, data breach laws and the 'sprint method'
Tue, 28th Feb 2017
#
hyperscale
#
public cloud
#
pam
Cybersecurity company CyberArk is employing hackers to fight against cyber threats and develop innovative security solutions.
Sophos launches new suite for cloud security and IoT management
Tue, 28th Feb 2017
#
uc
#
firewalls
#
network infrastructure
Sophos Mobile 7 is available now for on-site installation and will be available through cloud-based Sophos Central in mid-March 2017.
Cylance is now one of the top 50 companies leading the AI revolution
Mon, 27th Feb 2017
#
ai security
#
ai
#
cylance
AI security pioneers Cylance have been named one of Fortune Magazine's '50 companies leading the AI revolution'.
Could deception methods be the new answer to cybersecurity?
Mon, 27th Feb 2017
#
firewalls
#
network infrastructure
#
network security
Firms are unable to detect attackers for almost five months once they are inside systems, but deceiving attackers along the way can slow them down.
Switch vulnerabilities leave critical infrastructure networks wide open to attack
Mon, 27th Feb 2017
#
network infrastructure
#
cybersecurity
#
network switches
US Warns of Critical Vulnerabilities in Industrial Switches Used in Critical Infrastructure Sectors in Australia and New Zealand.
Hackers speak out: New study turns security stats on their head
Mon, 27th Feb 2017
#
endpoint protection
#
edr
#
hackers
The study confirms suspicions that attack methods are becoming ever more unique, with 50% of hackers changing their attack methods for every target.
Is your IT team experiencing alarm fatigue? Create a rapid response to cyber threats
Mon, 27th Feb 2017
#
siem
#
breach prevention
#
logrhythm
IT teams are experiencing 'alarm fatigue' and they are lagging behind. Here's how you can transform your teams to achieve rapid response.
Film review: Logan
Mon, 27th Feb 2017
#
gaming
#
digital entertainment
#
film review
The sound in itself is visceral; this film is well worth seeing on the big screen for the aural experience alone.
Sony Mobile unveils the Xperia X Compact, now available in New Zealand
Fri, 24th Feb 2017
#
sony
#
technology gifts
#
axis
Sony Mobile has revealed the availability and pricing of the Sony Xperia X Compact, the latest smartphone in the Xperia X series.
Kiwi student bound for Amsterdam to help robots build bridges
Fri, 24th Feb 2017
#
auckland university
#
3d printing
A young University of Auckland architectural graduate is set to take on Europe to use robots to build a pedestrian bridge over a canal.
Weekly NZ security roundup: 31c0n, cyber threats, Darknet and Mimecast
Fri, 24th Feb 2017
#
malware
#
firewalls
#
network infrastructure
NZ's cybersecurity scene is abuzz with 31c0n insights, stark cyber risks, Darknet exposés, and Mimecast's email defence revelations.
The 30 day MacBook Pro challenge: Can a Windows user become a Mac convert?
Fri, 24th Feb 2017
#
apple
#
notebook
#
mobility
Can a Windows user be converted into an Apple fan in just thirty days? I play guinea pig and use the MacBook Pro for work - and for play.
Suprema ups biometric sensor game to provide 'world's fastest matching speed'
Thu, 23rd Feb 2017
#
biometrics
#
fingerprint scanners
#
smartphones
Biometrics firm Suprema has launched BioSign 2.0, a mobile fingerprint authentication technology with unparalleled speed and accuracy.
NZ's premier security conference 31c0n probes unanswered questions in two-day event
Thu, 23rd Feb 2017
#
cybersecurity
#
aura information security
#
bt
An intimate and devoted group of 160 security professionals have descended on the Viaduct Events Centre today as part of 31c0n.
User behaviour may be the hidden secret to security, says Forcepoint
Wed, 22nd Feb 2017
#
data analytics
#
martech
#
planning
80% of cybersecurity professionals believe it's important to understand people's behaviours when it comes to intellectual property & critical data.
China Unicom & Radisys use CORD architecture to build better networks
Wed, 22nd Feb 2017
#
network infrastructure
#
sdn
#
naas
China Unicom and Radisys will be building an open software and network virtualization architecture for 5G services.
Dangerous Android Trojan masquerades as Flash Player update
Wed, 22nd Feb 2017
#
malware
#
cybersecurity
#
trojan
A new Android Trojan has been lurking under a fake app that tries to mimic a Flash Player update, ESET discovered this week.
Check Point joins Cyber Threat Alliance alongside global security heavyweights
Tue, 21st Feb 2017
#
advanced persistent threat protection
#
cyber threat
#
cyber threat alliance
Check Point is the sixth member in the global Cyber Threat Alliance (CTA), alongside Cisco, Fortinet, Intel Security, Palo Alto Networks and Symantec.
CompTIA zeroes in on behavioural analytics with new global security certification
Tue, 21st Feb 2017
#
data analytics
#
martech
#
planning
CompTIA introduces CSA+ certification, pioneering behavioural analytics in global IT security to tackle advanced cyber threats.
Film review: The Great Wall - it's man versus beast in this visual spectacle
Tue, 21st Feb 2017
#
gaming
#
digital entertainment
#
film review
The Great Wall of China may have been built to keep people out; but the biggest question in this film is: What if the invaders aren't people?.