Legacy data warehouse architectures may have been designed for large amounts of data – but even massive warehouses would struggle to manage, much less analyse, the 20 to 30 terabytes of operational data that nbn™ Australia collects on a daily basis.
David Braue |
07 Nov |
Read more
Cisco doesn't have a patch for this flaw affecting multiple ASA and Firepower security appliances.
Liam Tung |
01 Nov |
Read more
Cybersecurity risk often is treated as a nebulous, abstract concept. However, the possibility of attacks that start as cyber incidents but turn out to be a precursor to physical attacks are increasingly commanding more of our attention and vigilance.
Matt Loeb |
10 Oct |
Read more
Employees may find themselves putting their employers at risk by unintentionally subverting their company IT policies, taking advantage of the interconnected APIs of SaaS applications.
Hugh Darvall |
08 Oct |
Read more
Today, the NSW government launched its new cyber security strategy. The strategy is aimed at boosting public sector capability across government departments and agencies.
Simon Eid |
03 Oct |
Read more
Transform or die – this has been the mantra for successful businesses throughout the ages, and now more than ever we are seeing technology enable the digital transformation of business.
Ashwin Pal |
24 Sep |
Read more
Consumers today are increasingly using online businesses for everything from ordering clothes to groceries.
Mac Wang |
19 Sep |
Read more
Stakes are increasing when it comes to leveraging technology to define and deliver new value.
Matt Loeb |
14 Sep |
Read more
As a (semi-retired) ethical hacker, security professional and all-round computer geek, you might say I care a lot about technology.
Pieter Danhieux |
20 Aug |
Read more
Rural areas are the front lines for some of the most important gains technology is enabling in modern society. From blockchain to automation, a variety of emerging technologies are modernizing business models in rural areas around the world.
Matt Loeb |
16 Aug |
Read more
Digital disruption has resulted in the creation of a myriad of new business models and partnership ecosystems, in an era where collaboration and integration are no longer just nice-to-haves; they’re the currency of competitive advantage.
Mark Perry |
10 Aug |
Read more
Of course, to mine cryptocurrency.
Liam Tung |
27 Jul |
Read more
Issues with the security of supply-chain partners will be one of the biggest security threats CISOs face in coming years, a security expert has warned as new figures revive concerns that “naïve” Australian companies are failing to factor cybersecurity into their purchasing and vetting procedures.
David Braue |
26 Jul |
Read more
Fully a third of organisations have no cybersecurity expertise inhouse, according to a new survey that highlights the ongoing difficulties caused by Australia’s cybersecurity skills crisis.
David Braue |
26 Jul |
Read more
Attackers turn their attention to enterprise platforms to steal information and money.
Liam Tung |
26 Jul |
Read more
Modern society has used the email everyday ever since Ray Tomlinson invented it in 1972. Since then, it has gotten a steady foothold in our daily lives and will continue to do so as we progress.
John Mason |
03 Jul |
Read more
The Australian financial market is being increasingly disrupted by Fintech. The number of fintech startups in Australia had increased from less than 100 in 2014 to almost 600 in 2017.
Jeffrey Kok |
03 Jul |
Read more
The increases in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud.
Joseph Carson |
25 Jun |
Read more
It’s human nature to pinpoint our focus on the most dramatic threats to our safety, ignoring the more probable hazards. It works the same way for cybersecurity as it does in our personal calculus of shark attacks vs. everyday clumsiness.
Steve Durbin |
25 Jun |
Read more
As companies spread their wings and journey into the cloud, their workloads inevitably spread into multiple cloud services. While multi-cloud is now seen as a desirable strategy for business, this hasn’t always been the case. Early approaches to cloud adoption often involved moving workloads into a single public cloud service.
David Shephard |
25 Jun |
Read more