The latest in entrepreneurial technology news for Kiwis
Domain Name Commission
These search results are from across the Techday Network of sites
Domain Name Commission wins lawsuit against US intelligence firm DomainTools
"The ruling temporarily puts to an end DomainTools’ bulk harvesting of .nz domain holders’ personal information and selling that data for a profit."
Domain Name Commission & CERT NZ to share information about .nz cyber threats
The two agencies have agreed to share certain domain registration information so that they can ‘enhance’ cybersecurity in New Zealand.
Commissioners release privacy factsheet for .nz domain registrants
"Clearly, privacy matters to a number of individuals in the .nz domain name space," comments Domain Name Commissioner Brent Carey.
CERT NZ's Advisory Board extended for another six months
“I’m pleased all existing Board members have agreed to stay on and advise CERT NZ as we work through the refresh of our cybersecurity action plan."
Privacy concerns spark contact address masking for .nz domain owners
New Zealand domain name owners can now use a free address masking option that can mask contract addresses and make them invisible from WHOIS.
Government focuses on domain name security
“People want websites that are safe and trusted."
Feedback sought on proposed new approach to .nz domain name privacy
“Through the submission process, we're looking for interested parties to help guide us in striking an appropriate balance.”
Domain Name Commission launches .nz WHOIS review
The commission is seeking comment on a number of matters, including why .nz data should or should not be collected and made public.
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.
Whitepaper: How to make sure your security architecture keeps up with surging network speeds
The annual cost of cybercrime is expected to exceed US$6t by 2021 with a large contributor being the sheer amount of data that requires processing.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
A step-by-step guide to starting the security discussion with your executives
Your organisation has “jewels” in your servers and critical endpoints: Data.