Each day, as the speedy evolution of technology emerges, newer, more complex and increasingly dangerous cyber threats come onto the battlefield, thus presenting an ever-thriving danger to organisations, governments and enterprises everywhere.
Alan Kahn |
06 Dec |
Read more
No matter what type of organisation you work for, it’s hard to escape the cloud computing discussion. Cloud computing offers unparalleled advantages in terms of scalability and cost benefits, and there is no denying that it has changed the very nature of IT and the way use technology in business.
Sanjay Mehta |
22 Nov |
Read more
Today, CIOs are investing considerable resources in systems that provide them with better visibility into, and realtime reporting on, exactly what is happening on their IT systems.
Boaz Fischer |
15 Nov |
Read more
There’s a lot of talk in the security industry and among organisations about the threats we face – malware, advanced persistent threats, zero-days, targeted attacks, viruses, Trojans, distributed denial of service attacks, worms, phishing...the list goes on and on. But no matter how you parse it, it all comes down to threats. More specifically, two fundamental types of threats: known and unknown.
Chris Wood |
14 Nov |
Read more
Sometimes the most valuable sources of information are not what you might expect.
Andrew Bycroft |
14 Nov |
Read more
The attractiveness of adopting cloud services continues to grow. Who can argue against access to the latest technologies, a pay as you go model, rapid provisioning/de-provisioning and on demand scaling? All of these benefits lead to improved agility, faster time to market and a business focus on the business (not managing IT). Many of the risks of cloud computing have become less frightening as organisations have become more comfortable with data sovereignty and availability issues.
Wayne Tufek |
16 Oct |
Read more
"We, as far as I'm concerned, are in an arms race. It's the same old thing as the good old days of the Cold War," says Dick Bussiere, principal architect for Tenable Network Security in the Asia Pacific region. "The Russians would come up with something, the Americans would come up with a countermeasure, the Russians would come up with something else, and it never ends. I think we're kind of in a situation like that."
Stilgherrian |
30 Sep |
Read more
The term unified communication (UC) is a popular subject that has been floating around the workplace for some time….but is it really an essential component for businesses today?
Do employees, or businesses for that matter, really understand the pros and cons?
Gordon Makryllos |
30 Sep |
Read more
A few weeks back I caught up with a mate of mine who is a CISO for a major international bank. We try to make the effort to meet regularly, and I never pass up the opportunity to ask him some tough questions—an insight to the challenges, trends and priorities of the Financial Services Industry (FSI) is always valuable. These privileged relationships are extremely useful for keeping your finger on the pulse.
John Ellis |
22 Aug |
Read more
Technology, as we knew it, is no longer relevant. Every day we are bowled over with a new app, toy or technique. We are moving to a world of smart technology at a pace that is almost impossible to keep up with.
Gordon Makryllos |
21 Aug |
Read more
In the age of cloud, internal IT departments are being continuously challenged to demonstrate value and alignment to business requirements and business needs.
Puneet Kukreja |
05 Aug |
Read more
Bring your own device (BYOD) will continue to shift the way employees interact with enterprise applications and information, which raises considerable security challenges to any organisation. We already know that these devices include tablets, including iOS and Android smartphones, “Wintel” laptops, but there are many devices we are yet to see.
Terry Steer |
19 Jul |
Read more
The recent hike in the number and severity of cyber attacks around the world demonstrate that we are squarely in an era referred to as the “industrialisation of hacking” which has created a faster, more effective and more efficient sector profiting from attacks to our IT infrastructure. Driven by the desire for economic or political gain or attention to their cause, hackers are executing more sophisticated and damaging attacks that at the same time are becoming easier to launch with widely available tools.
Chris Wood |
08 Jul |
Read more
Cloud computing comes with many key decision and considerations. There are decisions to be made around whom to choose, what to look for and what specific service it is that you ultimately need for your organisation.
Gordon Makryllos |
04 Jul |
Read more
Small and Medium Enterprises (SMBs) are striving to keep up with larger corporations when it comes to technology, security and Mobile Device Management (MDM).
Ilan Hertz |
01 Jul |
Read more
Renown cryptologist and security specialist Bruce Schneier has joined the board of the Electronic Frontier Foundation (EFF), one of the United States' longest-running and most influential digital rights and civil liberties lobby groups. It's a move that will boost the EFF's intellectual heft in policy debates about online surveillance and privacy issues, as well as their influence in Washington.
Stilgherrian |
28 Jun |
Read more
In 1973 Peter Drucker in his book “Management Tasks and Responsibilities” defined strategic planning as: <i>“The continuous process of making present entrepreneurial (risk-taking) decisions systematically and with the greatest knowledge of their futurity..."
Puneet Kukreja |
04 Jun |
Read more
Mobility is having a profound impact on how people live and work. The modern workforce expects to be able to work anytime, anywhere from any device on any application. The number of mobile-connected devices will exceed the world’s population this year. While most companies realize that Bring Your Own Device “BYOD” policies creates new risks, the plethora of challenges brought by mobility go far beyond BYOD. In fact, most organizations are still lagging behind on making the changes necessary to adequately address these challenges.
Craig Sprosts, VP, platform and applications, Nominum |
27 May |
Read more
The speed at which IT is developing and the general nature of modern business means that many enterprises rely on specialists to manage our systems and applications. Economic and competitive pressures have made it imperative for organisations of all sizes to focus on their core competencies and turn to third-parties to assume responsibility for key corporate functions. The most common form of outsourcing is the cloud. The cloud simplifies many aspects of IT and the business services world.
Gordon Makryllos |
21 May |
Read more
The recent Australian Federal Police arrest of a Sydney hacker claiming to be from the international hacking group Lulz Security (LulzSec) has brought Distributed Denial of Service (DDoS) attacks once again into the limelight.
Aviv Abramovich |
16 May |
Read more