Technology news for Australia's largest enterprises
Kai Ping Lew
These search results are from across the Techday network of sites
Finance breaches highlight need for internal cyber vigilance - Bitglass
The financial services sector reported the second-highest number of data breaches in the 12-month period covered by the latest OIAC report.
Why businesses need a strategy to combat the enemy within – Ping Identity
While strengthening your organisation’s external defences with the latest tools and technologies makes sound sense, it’s only half a battle plan.
You’re invited: Digital Transformation and Making Effective Change
Designed and delivered by the Australian Graduate School of Management, the ACCELERATE DX Program promises to deliver practical Digital Transformation tools and thought leadership.
Application shielding startup RedShield raises $14m
RedShield CEO and co-founder Andy Prow says that taking capital from a New Zealand private equity player was a strategic choice.
Five ways robotic process automation is improving the public sector – FTS Data & AI
The robots are coming, but they should be welcomed with open arms, rather than fear and trepidation.
Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard
Enterprises looking to reduce the risk of cyber-compromise or attack need to think about adding multi-factor authentication technology to their arsenal.
Sumitomo Chemical chooses Workday to bring HR vision to life
With Workday HCM, Sumitomo Chemical will unify a wide range of the company’s HR functions in one single system.
Cloud-based data warehousing at the heart of today’s enterprise - Snowflake
Becoming a data-centric organisation has become an aspiration and a goal for thousands of Australian enterprises.
IoT devices leaving businesses open to security risks – Zscaler
IDC has forecast that spending on IoT will reach US$745 billion in 2019 and surpass the US$1 trillion mark in 2022.
Whitecliffe helping more women get into IT careers with flexible training hours
The New Zealand IT industry simply isn’t marketed towards women interested in studying technology.
Businesses must start planning for the cloud-native age – New Relic
DevOps creates automation between software development and IT/operations; enabling tech teams to build, test, and distribute software quickly and more reliably.
Digitally transform without fear with consistent security policies
DX carries increased risk, especially as organisations extend their network operations further afield with Operational Technology (OT) and tap into new opportunities with 5G.
VMware's open pledge to help partners and customers make their mark
Technology is neither good nor bad, but it’s often how we shape it. Will technology shape the world we want to live in? Or will it create a world we’re afraid to live in?
How visionary MSSPs build sustainable security revenue with Fortinet
Secure SD-WANs extend the same security policies that protect the enterprise into the branch office to provide consistent security across the entire network.
Securing your network at every point with an adaptable security fabric - Fortinet
The most effective method to ensure optimal network functionality is to employ consistent security.
Why there is a critical need to fix network comms security - Kemp
TLS 1.3 is designed to solve many of the vulnerabilities that led to attacks on previous TLS versions, as well as to improve the performance of encrypted communications.
Enterprises must get serious about data governance - Ecosystm
Just as health records being found in a dumpster was a risk in the 20th century, the risks of sloppy data management are real and rising.
Hands-on review: Supercharging the RTX with the ROG STRIX RTX2080 SUPER
You can expect stable 60FPS+ gameplay over 4K UHD resolution over most AAA titles, or even with DLSS turned on when working with WQHD resolution.
How to take your job search to the next level
What can you do to make sure you get the attention you deserve in your job search?
Simplifying collaboration in the changing workplace
Continuing advancements in technology and the rapid speed of delivery are driving incredible change in today’s workplaces.
Tapping into SD-WAN’s productivity gains without the security concerns
If you can migrate all of your security requirements to a single, interoperable security fabric, you can reduce your operational overheads significantly.
Successful threat hunting requires curation & collaboration
Many organizations already have the technology required for threat hunting, with SIEMs and threat intelligence a starting point.
Schneider Electric’s key considerations for deploying a hybrid data centre
Pod frame architectures and liquid cooling can greatly improve the efficiency of hybrid IT applications.
10 ways to benefit from the emerging ‘data nation’ - Snowflake
Data is opening up new opportunities for revenue generation that can significantly boost the corporate bottom line.