Check out the latest events and activities from Connect Smart and our Partners.
Isaac Holliss | 30 November 2017
Today we’re proud to release the report-back from the New Zealand and Australian cyber security delegation to Israel. The report, ‘Becoming a trust superpower’, lays out the lessons the delegation took from the visit...
Riley Reid, ARC Solutions | 31 October 2017
Mobile networks and mobile phones are an important and ubiquitous part of New Zealanders’ personal and working lives. In Aotearoa , around 95% of mobile phones sold are now smartphones. More people access the internet on a smartphone than any other device.
Oliver Barrett | 31 October 2017
The Internet of Things (IoT) describes the growing number of physical devices that are being connected up to the internet, the platforms that control them and the networks which give them connectivity.
Associate Professor Ryan Ko – University of Waikato | 31 October 2017
When we upload files into cloud storage or when we process and create data into the cloud, we immediately lose control of our data. Most of the time, we will not know where our data will be stored, or how many copies of the data are created.
Amy Corkery, NCPO | 31 October 2017
Associate Professor Ryan Ko – University of Waikato | 31 August 2017
David Eaton - Cyber Security Consultant and Chair of the Cyber Security Skills Taskforce | 31 August 2017
03 August 2017
Craig Dore, Senior Identity Architect, Asia Pacific, RSA | 29 June 2017
In today’s business environment, there’s a rapid shift that has been underway for the last decade, one which embraces two themes: the shift to cloud and the shift to mobility. These two themes provide clear value when applied to corporate IT.
Kevin Wu, Principal Security Consultant, Quantum Security | 29 June 2017
Mobile devices have increasingly become an essential part of our everyday lives. Our phones are no longer just a device for making calls or sending text messages. We rely on them for wider communication, transaction, navigation, media, Internet, lifestyle applications and more. Quantum Security