2020 Tech Predictions from Veeam
Throughout 2019, technology has continued to have a transformative impact on businesses and communities.
Dave Russell, Veeam | 28 Nov | Read more
Throughout 2019, technology has continued to have a transformative impact on businesses and communities.
Dave Russell, Veeam | 28 Nov | Read more
Has your organisation fallen victim to a hacking attack or serious data breach? They’ve become unremarkable occurrences in the digital era, in Australia and around the world.
Simon Howe | 04 Jul | Read more
The hacker-in-the-hoodie or the anonymous ‘Guy Fawkes’ mask have both become symbols synonymous with data breaches. Each one supports the common perception that breaches happen when outsiders with malicious intent somehow evade prevention and detection controls and steal sensitive data.
David Shephard | 04 Jul | Read more
The traditional focus of IT security has been on keeping out external threats, but the volume and frequency of security breaches caused by disgruntled, careless or negligent insiders has risen significantly in recent times.
David Shephard | 01 Jul | Read more
WARNING! Spoilers for Endgame ahead.
Thomas LaRock | 24 Jun | Read more
If you thought masked hackers in dark rooms stealing data and threatening the integrity of your company's core systems were your only security concern, think again.
Mohamed Jafriin | 15 May | Read more
IT security teams are overextended and understaffed, and security risks are occurring more frequently than ever before.
When things go wrong, responsible people step up to the plate and take – responsibility.
Iris Zarecki, Continuity Software | 17 Apr | Read more
The phone rings in the middle of the night. It’s the Security Operations Centre and a server containing vital data has been hacked.
Elliot Dellys, Hivint | 08 Apr | Read more
We live in an always-on society where, without fail we are connected. There are many benefits to this way of life, but we must also be aware of its dangers.
Steven Feurer, Paessler | 05 Apr | Read more
Bring your own device (BYOD), where employees work from personal devices such as mobile phones and laptops, is quickly becoming the norm in today’s business environment.
Anurag Kahol, Bitglass | 15 Mar | Read more
Businesses around the world have quickly embraced cloud technology as a critical solution to tackle operational complexities.
Michael Chetner, Zoom | 15 Mar | Read more
The benefit of covering all of Asia Pacific (APAC) is that you get to see and experience how things are done broadly within the region.
Ashwin Pal | 15 Mar | Read more
The reality is that traditional development methods lack the agility needed to keep up with modern security needs. So how do businesses keep their security processes aligned? Enter: DevSecOps.
Yannick Townsend | 11 Mar | Read more
The new hybrid threat that has surfaced in the cyber world has helped cybercriminals in their pursuit of malicious attacks.
Rodney Joffe, Neustar | 07 Feb | Read more
After a few years of missteps and slower-than-anticipated take-up, it's now clear what will get enterprises to open their wallets for SD-WAN, writes Budd Ilic, ANZ Country Manager, Zscaler.
Like any elite sporting team, the success of an IT team’s breach prevention program relies on a strong defence.
Serkan Cetin, One Identity | 04 Feb | Read more
It’s as sure a bet as any. Another day? Another cybersecurity breach
Rilind Elezaj | 30 Jan | Read more
Every year is the same: the silly season comes, and with it so do the cybercriminals and phishing attacks. Last year was no exception, with Cyber Monday, Black Friday, Christmas and Boxing Day remaining on top of the list for hacking and phishing threats.
David Arthur | 22 Jan | Read more
Cybersecurity will continue to be a key business focus for organisations in 2019 and beyond, with ongoing risks showing no signs of abating.