In an age of mobile devices, remote workers, and lightning speed innovation, cloud software and tools for collaboration are a no-brainer for any organisation to remain competitive
Fintan Lalor |
25 Sep |
Read more
Many conversations about ransomware start with: “Are we going to pay?” Hopefully this happens before falling victim to an attack.
Andrew Huntley, Barracuda |
25 Sep |
Read more
Enterprises are adopting SD-WAN solutions at an accelerating pace, largely due to it being a better fit than traditional router-centric WANs for today’s geographically distributed enterprises pursuing a cloud-first strategy for application delivery.
Graham Schultz, Silver Peak |
25 Sep |
Read more
Whenever something goes wrong there’s a natural tendency to want to find someone to blame.
Mark Lukie, Barracuda Networks |
25 Sep |
Read more
Despite higher levels of awareness among executives about cybersecurity risk, security and risk management leaders struggle to make a clear and defensible business case for investing in a security program.
Tom Scholtz |
25 Sep |
Read more
With just 36% of Australians believing that their bank has their best interests at heart, it’s hard to argue that from a reputational perspective, the last two years have been some of the toughest years in recent memory for the Australian Banking & Financial Services sector.
Alvin Rodrigues Senior Director, Forcepoint |
25 Sep |
Read more
The recent data breaches at Capital One and National Australia Bank (NAB) reinforce the evidence that human error represents a serious threat to organisations in finance.
David Shephard |
24 Sep |
Read more
Last month, more than 1000 voice recordings captured by Google Assistant were leaked without users’ knowledge, each one allegedly containing personal data, private conversations and identifying features about the voices thereon.
James Slaney, Co-Founder and Head of Product, Dubber |
23 Sep |
Read more
Since all sites and applications delivered over the Internet, and probably on private intranets, need to put security at their core, it is imperative that they use full data encryption.
Benjamin Hodge, Kemp |
23 Sep |
Read more
Cyber criminals are using malware to steal computing power from various target devices in order to secretly mine cryptocurrency
Anurag Kahol, Bitglass |
23 Sep |
Read more
The financial services sector has been identified as one of the most sophisticated in Australia in terms of digital transformation, particularly with the forthcoming Consumer Data Right and inroads into Open Banking.
Jason Baden, F5 |
09 Sep |
Read more
Industry research firm Gartner recently released the first-ever Magic Quadrant for Privileged Access Management – which shines a light on the importance of protecting privileged credentials in today’s volatile threat landscape.
Andrew Slavkovic |
09 Sep |
Read more
Not so long ago, supply chains could succeed without much technological intervention.
Thomas LaRock |
21 Aug |
Read more
Bots are tipped to account for more than half of the world’s internet traffic in 2019.
Josh Shaul, Akamai Technologies |
12 Aug |
Read more
For the second time in three months, a border force outage across Australia’s international airports caused massive chaos and disruption to passengers with lengthy delays in immigration queues.
Sean Abbott |
12 Aug |
Read more
Cyber security teams feel more confident in delivering their mandates when they report to the CISO or CEO, rather than the CIO, the 2019 ISACA® State of Cybersecurity Survey revealed.
Phil Zongo |
12 Aug |
Read more
Artificial intelligence is both an amazing and scary idea all wrapped up in one don’t you think.
Craig Ford |
09 Aug |
Read more
Endpoints are everywhere—computers and laptops, smartphones, tablets, printers and smart home devices.
Aaron Bugal |
05 Aug |
Read more
Enterprises need to move faster than ever to stay competitive and get ahead. Time to market for products and services has shortened dramatically from years to days.
Angelo Joseph, Google Cloud ANZ |
05 Aug |
Read more
Of all the cyberattacks a business can face, one of the most crippling is ransomware.
Theo Hourmouzis, Cohesity |
05 Aug |
Read more