The applications container market looks set to surpass the public cloud services and infrastructure market, at least in terms of compound growth percentage, and for good reason.
Bill McGee, Trend Micro |
20 May |
Read more
With Australia’s Federal election being held on Saturday 18 May, Australians need to be hyperaware of social networks to avoid consuming misinformation and falling victim to scams related to the election.
Crispin Kerr |
17 May |
Read more
Healthcare is in the midst of a technology revolution. Cutting edge innovations like Artificial Intelligence (AI), Machine Learning (ML) and the connected ‘Internet of Things’ (IoT) are driving the digitisation of hospitals and the health industry at pace to improve patient care.
Sanjay Saini |
16 May |
Read more
If you thought masked hackers in dark rooms stealing data and threatening the integrity of your company's core systems were your only security concern, think again.
Mohamed Jafriin |
15 May |
Read more
In February 2019, LandMark White (LMW), Australia's largest independent property valuation firm publicly announced that a key online platform had been compromised and third parties had accessed over 100,000 records including property valuations, information of borrowers, lenders, homeowners and property agent data.
Ben DiMarco |
15 May |
Read more
IT security teams are overextended and understaffed, and security risks are occurring more frequently than ever before.
Simon Eid |
14 May |
Read more
Official recognition as a charity has given Australia-based privacy network Loki the confidence to take on additional developers who, the project’s cofounder says, are helping it expand the mobile capabilities of its globally adopted privacy tools.
David Braue |
09 May |
Read more
It was Benjamin Franklin who once wisely quipped, “Nothing is certain except death and taxes.” I would add data breaches to that list.
Bede Hackney, Tenable |
01 May |
Read more
Does your organisation have a bird’s eye view of the company network or is its activity viewed ‘through a glass darkly’?
Jeff Costlow |
01 May |
Read more
By 2021, the world will be significantly digitized and connected. The race to develop the next generation of super-intelligent machines will be in full swing and technology will be intertwined with everyday life.
Steve Durbin |
30 Apr |
Read more
Winning a bet is one of life’s little pleasures. People make bets all the time. Many people even like to place wagers on the outcome of those bets. The trouble is gambling can become an addiction.
Andrew Huntley, Barracuda |
29 Apr |
Read more
When things go wrong, responsible people step up to the plate and take – responsibility.
Iris Zarecki, Continuity Software |
17 Apr |
Read more
When one thinks of a breach, there’s a cliché image of a mysterious hacker wearing a hooded sweatshirt trying to infiltrate a company’s online defences.
Rob Le Busque, Verizon Enterprise Solutions |
17 Apr |
Read more
Today’s cybersecurity professionals find themselves engaged in asymmetric warfare – and often on the losing end.
Brad Engstrom, VMware |
17 Apr |
Read more
The rise of the cloud in the enterprise stems from its ability to enable anytime, anywhere data access, which increases employee productivity and flexibility.
David Shephard |
17 Apr |
Read more
Cybercrime is a term that is thrown around a lot. For mainstream media the term can encompass everything from cyber warfare right the way through to the stereotypical loner, hacking from the dimly lit confines of their parents’ basement.
David Warburton |
16 Apr |
Read more
Most IT leaders will remember the days of “shadow IT” without much joy. As employees brought their own apps and solutions into the business, they also ushered in a surge of security issues throughout systems and networks – leaving IT scrambling to find the right balance between choice, flexibility, and control.
Jon McGettigan |
09 Apr |
Read more
IT and cybersecurity operations have traditionally been siloed within businesses, often due to management decisions to break down overarching goals and assign smaller actions to different parts of the company.
James Ley, Ivanti |
09 Apr |
Read more
The phone rings in the middle of the night. It’s the Security Operations Centre and a server containing vital data has been hacked.
Elliot Dellys, Hivint |
08 Apr |
Read more
The Information Commissioner’s quarterly reports under the Notifiable Data Breaches scheme makes for some sobering reading - as do the results from recent research conducted by Brennan IT.
Stephen Sims |
05 Apr |
Read more