Google buys enterprise cloud file storage firm Elastifile
The acquisition will bring Elastifile’s cloud file storage for enterprises into Google Cloud Filestore.
How to navigate the innovation versus security dilemma
Report: Why vulnerability assessment is the first step in security strategy
Queensland taps iseek for DCaaS on ICT panel
You’re invited: The Digital Workplace Conference, Sydney
Kyckr signs agreement to expand into new platform
Thycotic introduces certification programme to A/NZ
Whitepaper: Using syslog-ng to beat artificial ignorance
During the log analysis administrators read only interesting messages, like ‘Violation’ and ‘Unknown’ messages.
Data science: Why a data strategy is nothing without it
It’s inevitable that some valuable data will be discarded as part of the process of filtering out what fits the most important criteria at any one time.
Mobile Mentor's Windows 10 endpoint management solution
If only a business’ endpoints could be managed with the same simple, intuitive toolsets as smartphones.
Druva acquires hybrid cloud data protection firm
The acquisition will enable Druva to provide customers the ability to keep data readily available on-site through SaaS-based business continuity, short recovery windows, and greater workload mobility.
Kyocera's green sustainability efforts recognised
Kyocera says its efforts to increase sustainability and reduce greenhouse missions are part of the ‘Kyocera philosophy’.
Spirit eyes MSP market with $2.3 million acquisition
Spirit to expand its service offering into the MSP sector with the acquisition of Arinda IT.
Why A/NZ workers feel their role is changing due to digital transformation
Australians and New Zealanders are facing increasing job uncertainty due to digital transformation.
Huawei Australia seeks next intake for Seeds for the Future program
The program provides an opportunity for Australian university students studying STEM-related subjects to spend a month in China on a work and study program.
Whitepaper: Using logs to drive compliance
Log messages are filled with personal information that require proper security in order to comply with the Privacy Amendment Act 2017.
Blue Prism to deliver automation solutions through Azure
The collaboration will integrate Blue Prism’s automation capabilities with Azure AI technologies including Cognitive Services and Machine Learning.
Supermicro launch solutions for security and AI at the edge
New edge servers bring up to 37 LAN port software-defined networking solutions and AI inferencing to the network edge.
Sydney & Melbourne amongst world's top places for women entrepreneurs
"Every day I meet inspiring women in Australia and New Zealand, so it is heartening to see Sydney and Melbourne rank in the top 15 cities globally in our WE Cities Index report."
Intel releases new chip packaging tools to promote innovation
When combined with Intel’s process technologies, new packaging capabilities will allow for customer innovation and help develop new computing systems.
10 ways to benefit from the emerging ‘data nation’ - Snowflake
Data is opening up new opportunities for revenue generation that can significantly boost the corporate bottom line.
Do we need cybersecurity training? Phishing remains problem area
“Implementing ongoing and effective security awareness training is a necessary foundational pillar when building a strong culture of security."
Report: Using UEBA to increase security analytics effectiveness
To facilitate more effective cybersecurity, businesses need to accommodate larger data sets with more advanced analysis of the data.
ESET named champions in the Canalys Cybersecurity Matrix
The report states that ESET has local presence in every part of the world and works closely with channel partners.
Mistrust amongst organisations when it comes to data, survey finds
"The different levels of confidence displayed by people at a management level and operational data workers are not surprising, but it is definitely worrying."
IoT home connectivity on the up, as are cybersecurity threats
“This data helps us shed light on the global emergence of IoT and types of the security problems present in the devices real users own.”
WA’s John XXIII College chooses Veeam for backup and DR
On top of learning tools, administrative support, payroll, finance and alumni services are some of the services that also must be constant and stable.
Trend Micro adds Deep Security as a Service to Azure Marketplace
Trend Micro Deep Security delivers a multi-layered automated approach to protect hybrid cloud workloads and container environments.
Check Point releases report on public cloud security challenges
Unauthorised access, insecure interfaces, misconfigurations and account hijacking named as the biggest vulnerabilities in the public cloud.
AI projects set to double, with CX the key driver behind growth
“The rising number of AI projects means that organisations may need to reorganise internally to make sure that AI projects are properly staffed and funded."
ESET: Will blockchain secure the Internet of Threats?
It is well established that contemporary IoT devices, and their associated cloud services, have a terrible security track record.
Using UEBA to fight user-based threats internally
This whitepaper uncovers how User and Entity Behaviour Analytics (UEBA) reduces your organisational risk and enables you to respond more quickly to attacks.