The digital age extends to the bottom-line – even when it comes to signing on it!
Adobe APAC’s Head of Document Cloud Solutions says Australian businesses are lagging when it comes to digital trends
Chandra Sinnathamby | 20 Dec | Read more
Adobe APAC’s Head of Document Cloud Solutions says Australian businesses are lagging when it comes to digital trends
Chandra Sinnathamby | 20 Dec | Read more
On December 15, SAP released its set of security patches for December 2016, the last one for 2016.
Alexander Polyakov | 20 Dec | Read more
Technology is on the verge of yet another breakthrough: the birth of Artificial General Intelligence (AGI), or the kind of AI that dominates science fiction stories. When that will occur remains uncertain, but few scientists doubt that it will happen.
Lisa Froelings | 16 Dec | Read more
With the number of mobile devices used within businesses growing by the day, ensuring they remain secure is becoming an increasing challenge for IT teams.
David De Laine | 16 Dec | Read more
It’s no secret that the threat of cyber-crime in Australia is on the rise. Last year, the number of cyber-threats more than doubled.
Dan Slattery | 08 Dec | Read more
Imagine life without our smartphones, tablets, digital televisions and the Internet. We would still be stuck in the early 90s.
Nathan Lowe | 29 Nov | Read more
It’s no secret digital technologies have changed everything.
Joshua Kennedy-White | 25 Oct | Read more
Controlling access to sensitive data is of utmost concern for the world’s most complex business and network environments. The amount of security-related data stored across a network is immense for many organizations, and relating all this data to the user’s account information in Active Directory can be tricky and time consuming.
Dean Wiech | 06 Apr | Read more
During the years’ I’ve spent working in government I have witnessed interesting political shenanigans but I’ve never heard politicians put positive spin on a data breach or cyber crime. No one says out loud that we should stop worrying about computer network defenses or poor cyber hygiene.
Dan Lohrmann | 20 Apr | Read more
Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.
Steve Durbin | 30 Mar | Read more
Major web browsers and many web sites rely on the Secure Sockets Layer (SSL) protocol, which encrypts confidential information, such as credit card numbers, before sending them securely over the internet. SSL encryption ensures that email, e-commerce, voice-over-IP, online banking, remote health and countless other services are kept secure.
Ananda Rajagopal | 03 Mar | Read more
Triple-A ratings are normally associated with Chief Financial Officers (CFOs) keeping a tab on John Moody’s bond credit rating. In the world of IT, it can be a platform for businesses to rate the efficiency of their IT security implementation.
Florian Malecki | 03 Mar | Read more
We live in an application world. From shopping to communicating with friends, reading the news, following our favourite sports teams to listening to music – we do it through apps. With so many interactions and transactions now taking place via apps, maintaining security is becoming a big concern.
Matt Miller | 20 Feb | Read more
There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.
Mav Turner | 20 Feb | Read more
2015 is likely to be ‘as bad or worse’ for large-scale data breaches than 2014, when a series of incidents at large companies exposed the sensitive information of millions of people and businesses, according to a new report.
Every business holds at least some sensitive data. This may be sensitive personal information belonging to clients or employees, or confidential data relating to business operations. Keeping this secret information secret should be a concern to every business, no matter what industry or size.
James Billingsley | 30 Jan | Read more
While most people today have a basic awareness of what augmented reality (AR) is, there’s a number of misconceptions about how widely the technology can be used
Michelle Goldsmith | 22 Jan | Read more
For years, passwords have been the dominant means by which organisations authenticate customer access to online services. Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.
Steve Durbin | 13 Jan | Read more
Mobile technology has redefined the way businesses operate, unleashing unprecedented levels of flexibility, collaboration and communication.
David Balazsy | 13 Jan | Read more
Recently there has been an almost constant feed of news around distributed denial of service (DDoS) attacks, with banks, gaming organisations, governments, educational establishments and e-commerce vendors all being attacked. The DDoS threat has evolved considerably over recent years, with significant changes in the frequency and scale of attacks, and the motivations of cyber criminals. And, over a similar period, many organisations have become highly dependent on the availability of Internet services for their business continuity.