Cyber Security Blog

Updates from Fusion’s Cyber Security Lead Architect.


Race Is On to Protect Data From Next Leap in Computers. And China Has the Lead.

Race Is On to Protect Data From Next Leap in Computers. And China Has the Lead.

December 4, 2018

SAN FRANCISCO — The world’s leading technology companies, from Google to Alibaba in China, are racing to build the first quantum computer, a machine that would be far…

PWC Digital Trust Insights Report 2018 – Building trust is a journey worth taking

PWC Digital Trust Insights Report 2018 – Building trust is a journey worth taking

November 28, 2018

“Digital businesses that lead in safety, security, reliability, privacy and data ethics will be the titans of tomorrow. If the lifeblood of the digital economy is data,…

NZ being targeted for cyber attacks – study

NZ being targeted for cyber attacks – study

November 8, 2018

Fusion Networks works with clients to build resilient security capabilities to mitigate and protect against increased threats. There’s good reason to be proactive…

The key pillars of strong cybersecurity strategies

The key pillars of strong cybersecurity strategies

November 2, 2018

As organisations shift from legacy to new digital channels, cyber attacks are increasing in intensity and ferocity. Cybercriminals are using sophisticated tools and…

Watch a Tesla Model S get stolen with a key fob hack

Watch a Tesla Model S get stolen with a key fob hack

October 23, 2018

A clear look at a potential vulnerability for cars with keyless entry Tesla’s cars may be high-tech, but that doesn’t mean they’re foolproof when it comes to…

Security, Convergence and Connectivity

Security, Convergence and Connectivity

October 2, 2018

There used to be two types of people when considering cyber security: Those focused on creating a closed system that can never be breached, and Those who recognised that…

‹ Prev Page
Go to Page: 1 2 3 4

Don’t miss out

Subscribe for updates from experts in the NZ IT industry.