IT & OT convergence brings new cyber risks to industrial sector
IT and operational technology (OT) are on a journey to convergence, but that convergence must be managed with caution in order to manage cybersecurity risks that go with it.
Western Digital updates flash data centre systems portfolio
Newcastle smart city initiatives win two IDC awards
Sydney & Melbourne amongst world's top places for women entrepreneurs
Gartner: A/NZ IT spending continues to outstrip global average
Businesses feel they need AI to respond to cyber-threats - Capgemini
Log classification doesn’t have to be mundane and repetitive – here’s how
Whitepaper: Measuring SIEM’s ability to create actionable defence
Many organisations are struggling to keep pace with the speed in which hackers are attacking their system.
Opinion: Facebook's Libra proves cryptocurrencies are now mainstream
They are here to stay. And their influence is set to grow exponentially."
NVIDIA expands DGX-Ready Data Center program globally
The program is designed to aid companies in finding modern data center facilities for their artificial intelligence-based infrastructure.
Mistrust amongst organisations when it comes to data, survey finds
"The different levels of confidence displayed by people at a management level and operational data workers are not surprising, but it is definitely worrying."
Marriott, British Airways fines highlight critical need for security investment
The last week has brought heavy fines against the likes of global hotel chain Marriott and airline British Airways, casting a harsh spotlight on the price of cyber attacks.
Syslog-ng use cases and scenarios for Splunk
Using syslog-ng can improve the reliability log data collection from network devices.
How to collect, filter, and normalise logs in complex environments
To derive actionable, valuable business information from raw log data, it is necessary to collect, filter, and normalise messages from various sources.
Thycotic introduces certification programme to A/NZ
The programme enables cybersecurity service companies to provide technical support and professional services using Thycotic PAM solutions.
Case study: Kemp load balancers resolve issues for Now IT
Now IT faced a problem when its load balancer was unable to share information with AWS’ relational database, or access Microsoft Exchange.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.
Report: Why vulnerability assessment is the first step in security strategy
Tenable’s latest research examines real-world vulnerability assessment practices at 2,100 organisations to see how they’re approaching cyber hygiene.
Queensland taps iseek for DCaaS on ICT panel
iseek’s growing number of Australia-based data centres has won it an appointment to the Queensland Government’s ICT supplier panel.
QNAP launches beta of new version of NAS OS
QTS 4.4.1 beta 3 includes VJBOD Cloud for integrated cloud object storage and CacheMount for low-latency cloud data access.
WA’s John XXIII College chooses Veeam for backup and DR
On top of learning tools, administrative support, payroll, finance and alumni services are some of the services that also must be constant and stable.
Leveraging Elasticsearch and syslog-ng to maximise log management
Syslog-ng is a single, high-performance log collector for device, system, and application logs, greatly simplifying logging architecture.
Global banks fail to keep up with application security
One bank had an unpatched vulnerability that has existed since at least 2011.
You’re invited: The Digital Workplace Conference, Sydney
This is the definitive Australian Digital Workplace Conference of the year. 30 speakers. 40 sessions. 400 attendees. 15 exhibitors. Save the dates: August 6-7, at the Sofitel Sydney Wentworth Hotel. Don’t miss out! Tickets on sale now.
Whitepaper: An all-in-one guide on cloud migration planning
Technology-driven business disruption is a very real phenomenon.
Spirit eyes MSP market with $2.3 million acquisition
Spirit to expand its service offering into the MSP sector with the acquisition of Arinda IT.
Whitepaper: Using logs to drive compliance
Log messages are filled with personal information that require proper security in order to comply with the Privacy Amendment Act 2017.
Do we need cybersecurity training? Phishing remains problem area
“Implementing ongoing and effective security awareness training is a necessary foundational pillar when building a strong culture of security."
Tech/talent combo key to solving underemployment, says Verint
IT and HR leaders must work more closely together to redefine the future workforce in order to keep the Aussie job market from collapsing.
92% of businesses experience identity challenges - LastPass
Data from the report reveals IT professionals overwhelmingly (82%) agree that poor identity practices have exposed their business to risks.
The future of cybercrime in Australia – ESET
Cyber-attacks will continue so long as the target seems worthwhile and the attackers have funding to continue their work.
Lonely Planet partners with Acquia to enhance the travel experience
“Lonely Planet recognises the value of putting the right technology in place."