Much like the previous year, 2016 has seen the Internet of Things (IoT) phenomenon continue to be a hot topic amongst the IT industry.
Robin Schmitt |
25 Oct |
Read more
As commerce continues to shift online, IT managers are finding themselves juggling two competing priorities.
Mark Perry |
14 Oct |
Read more
The number of detected security incidents in Australia increased by 109% in the last 12 months according to PwC’s Global State of Information Security® Survey 2016.
Scott Crane |
14 Oct |
Read more
Gone are the days when data was confined to the data centre and we could put a virtual fence around it and protect it. Now data is everyone with multiple copies of it. This causes a massive headache for CISOs who are tasked with protecting this data from falling into the wrong hands. The question then arises, with data literally everywhere, how do we achieve this?
Ashwin Pal |
02 Aug |
Read more
Research is in progress that will make it easier to find patterns of attack by cyber-criminals, and share results with the larger community.
Brett Williams |
27 Jul |
Read more
Since Mother Nature decided to flex her muscles recently, insurance has become something of a hot topic.
Scott Crane |
22 Jul |
Read more
Compromised credentials are the bane of IT leader’s existence. They continue to cause havoc, as headlines and leaders clearly expect.
Dean Wiech |
08 Jun |
Read more
Hackers, attackers and cybercriminals are no slouches when it comes to staying on the cutting edge of the tools of their trade. The black hats that seek to exploit our networks, applications and users are inventive and excellent problem solvers when it comes to finding new ways to break into our systems.
Nicolas Lennon |
31 Mar |
Read more
Barely a day goes by without new reports of organisations falling victim to cyber-attacks. Data breaches, network outages and system disruptions have become an unfortunate reality of the modern digital world.
David De Laine |
31 Mar |
Read more
Data breaches have hit the news recently for all the wrong reasons. A major grocery chain has recently suffered a major data leak, the latest in a long line of businesses that have been forced into damage control mode after widespread dissemination of information that should never have entered the public domain.
Kieran O'Shaughnessy |
18 Jun |
Read more
The first thought that comes to mind for most consumers when they hear the mention of the Internet of Things (IoT) is their fridge telling them when the eggs have run out; shoes indicating how far they have travelled; cars keeping them up to date on local traffic so that they know which routes to avoid; or energy meter signaling how much heating has been consumed. While not all of these capabilities have become a reality across most households, Gartner predicts the use of connected devices to grow exponentially, with at least 4.9 billion connected things expected to be in use this year, which is up 30 percent from 2014. By 2020, Gartner forecasts this number to reach 25 billion .
Matt Miller |
20 May |
Read more
IoT seems to be buzz word in IT and business at the moment. Simply put, IoT is defined as everyday objects with computing devices embedded in them that have a means to send and receive data over the internet.
Ashwin Pal |
20 May |
Read more
A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure. With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways
Gerardo Altman |
19 May |
Read more
In 2014, several successful malicious attacks against large financial services, government and private sector firms gave a clear indication of the changes occurring in the network security industry. The recent Ponemon Institute Cost of a Data Breach study found the average cost of a data breach to be $3.5 million with average cost per compromised record more than $145.
Sudeep Charles |
27 Apr |
Read more
The continuous coverage of network breaches and data leaks, indicates that information security has become a dangerous blind spot for many businesses. This is making it critical for CEO’s to familiarise themselves with their organisation’s internet security policies and procedures, as they become increasingly accountable for any failures.
David Higgins |
27 Mar |
Read more
Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.
Puneet Kukreja |
26 Mar |
Read more
In an environment of unrelenting attacks, network packet capture and security analytics are essential for discovering the attack while it is in progress and to provide the intelligence to minimise the damage done as well as to prevent future attacks.
Scott Crane |
24 Mar |
Read more
With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.
Joy Mali |
20 Mar |
Read more
The 2014 Asia-Pacific Spatial Excellence Awards (APSEA) have recognised some of the most innovative new products and technologies in the market, with augmented reality application Augview taking out the Innovation and Commercialisation Award.
Augview |
12 Mar |
Read more
The recent article by Cristian Florian, Most vulnerable operating systems and applications in 2014', was a huge hit, generating hundreds of comments and often heated debates and criticism. His analysis was also picked up by leading tech publications, generating even more chatter. What stood out is that IT professionals are really passionate about their favourite platform. This is a huge positive in the IT world as it helps a platform evolve beyond the efforts of its official maintainers and the results benefit everyone.
Emmanuel Carabott |
09 Mar |
Read more