Infrastructure as important as ever with edge computing and hybrid cloudOrganisations and IT partners could be forgiven for thinking their own physical infrastructure doesn’t matter anymore.
Why businesses should ban email attachments
"When people are working from an outdated version of a document, they can waste time, make errors, and potentially risk the success of the project they’re working on."
Transformation of industry verticals through 5G – Frost & Sullivan
5G has the potential to transform industry verticals through indoor connectivity, but certain key verticals will experience stronger growth than others.
Research reveals the state of AI in Australian businesses
While Australian organisations are concerned about the impact of AI on society, the research suggests Australian businesses could be doing more to minimise the potential risks.
AWS announces the general availability of AWS Ground Station
Once customers upload satellite commands and data through AWS Ground Station, they can supposedly download large amounts of data over the high-speed AWS Ground Station network.
Citrix to extend Workspace to Google Cloud
“In expanding our partnership with Citrix, we can better help these customers with their transformations by enabling them to access and run the applications their businesses depend on anywhere—simply, flexibly and securely.”
Hybrid cloud security big concern for business leaders
A new study highlights that IT and security professionals have significant concerns around security for hybrid cloud and multi-cloud environments.
“First-of-its-kind” VR training platform launches in Oz
Curiious IQ is enabled for any VR device and can stream live to small groups or up to 50 or more headsets simultaneously.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared.
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
How SUSE plans to help customers innovate, compete and grow
“SUSE is powering digital transformation with agile open source solutions like SUSE Enterprise Storage."
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.
Gen Z confidence in the economy is on the decline
Businesses need to work hard to improve their reputations.
SIEM: Expensive? Storage-intensive? Not any more with these performance tips
SIEM can be expensive, eat up storage, and overwhelm IT teams with the sheer differentiation of log data formats that they need to process. Yet SIEM is now an essential part of an organisation’s security strategy.Download
Whitepaper: Neutralise your biggest security risk - your employees
Internal threats caused by careless employees increased by 37% last year, a study has found.Download
Using central log management to drive data privacy compliance
Central log management is key to ensure personal information security and mitigating the probability of eligible breaches.Download
DDN completes Nexenta acquisition
DDN holds a suite of products, solutions, and services that aim to enable AI and multi-cloud.
Atos develops edge server with security in mind
The BullSequana Edge server is able to securely manage and process IoT data close to the source of data generation so that it is treated immediately.
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.Download
Informatics deepens integration with Google Cloud
The data management company has connected its solutions with Google Cloud’s big data analytics solutions.
Deakin Uni scores double win with Exabeam partnership
Australia’s Deakin University is partnering with SIEM security company Exabeam in an effort to boost the university’s cybersecurity degree program and strengthen its SIEM capabilities.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Sony and Microsoft to explore strategic partnership
“Our partnership brings the power of Azure and Azure AI to Sony."
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.Download
Apple brings 8-core processors to MacBook Pro
The addition of 8th- and 9th-generation Intel Core processors will deliver 40% more performance than a 6-core Pro.
Dell EMC launches interactive AI Experience Zones
The AI Experience Zones are designed to educate visitors about how to start, identify, and implement an AI project.
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Preventing business email compromise starts on the inside
90% of global organisations have seen phishing attack volumes increase and 40% have seen the volume of impersonation attacks increase.Download
New ACS report reveals challenges ahead for blockchain
“Blockchain has some way to go before it becomes a mainstream technology."
HPE to acquire supercomputing leader Cray
“Cray is a global technology leader in supercomputing and shares our deep commitment to innovation."
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Research highlights the biggest frustrations in Australian IT departments
“This IT situation needs to change if organisations want to thrive."
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
MSSPs for dummies - all you need to know about multicloud security
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. A lot is at stake and yes, you should be cautious.Download
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.Download
Big SafeBox Data deploys QNAP NAS to offer GDPR-compliant backup solutions
Implementing QNAP has proven to be a great success for BSBData.
DNS security is easier than you think
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
Hands-on review: MiniTool Power Data Recovery Software
I came across a wee gem of advice when researching the world of data recovery. As soon as you get that sinking feeling and realise you’ve lost a file, stop using your computer.
Veeam joins the ranks of $1bil-revenue software companies
It’s also marked a milestone of 350,000 customers and outlined how it will begin the next stage of its growth.
You only get one chance to make a first impression
Regardless of where you come from one thing is for certain, businesses only get one chance to make a first impression.
Whitepaper: SIEM can make security practices worse – here’s how you avoid it
Security alerts will increase in both volume and diversity as enterprise networks and systems expand in parallel with a surging cybercrime community.Download
Gold Coast launches Australia’s largest city LoRaWAN network
The network is being made available for commercial use and the deployment of wide-ranging IoT applications.
IT admins: Exploit the benefits of advanced log classification
It’s not hard to say ‘I don’t envy you’ to system administrators who are lumped with the burden of classifying log messages every time somebody conducts an action on the network.Download
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
It's neck-and-neck: The race between security and innovation
Rackspace will help you uncover more about the contradiction within Australian businesses and most importantly, how to solve it.Download
The impact of bringing biometrics to the door
"Despite the benefits of biometrics, there have been impediments to its broader enterprise adoption."
Whitepaper: Modern information management is a necessity, not a choice
Organisations are facing major challenges that makes information management more challenging than ever before.Download
Nutanix evolves multicloud offerings
Nutanix has expanded its multicloud solutions portfolio to further evolve its offerings across public and private cloud.
The emotional side of cybersecurity
To train or not to train: This is the emotional side of cybersecurityDownload
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Qualtrics aims to help organisations master experience management
Experience Basecamp helps users master XM products, including CustomerXM, EmployeeXM and Research Core.
How organisations should prepare for cloud migration
How ready are Australian organisations for cloud migration?Download
Why the retail industry has misplaced network priorities
“For retail organisations unplanned network outages can impact both revenue and reputation significantly."
Data#3 to exclusively provide MS licences to WA Government
The technology services provider has won two contracts with the Western Australia Government, becoming its sole Microsoft licence provider.
Veeam Availability Orchestrator update aims to democratise DR
The ability to automatically test, document and reliably recover entire sites, as well as individual workloads from backups in a completely orchestrated way lowers the total cost of ownership (TCO) of DR.
Veeam enables secondary storage solutions with technology partner program
Veeam has worked with its strategic technology alliance partners to provide flexible deployment options for customers that have continually led to tighter levels of integration.
Nuix eyes legal sector as eDiscovery demand skyrockets
eDiscovery must encompass so much more than email and documents. If you haven’t looked at text messages and online chats, digital images, mobile devices, data in the cloud and social media, you’re not getting the whole story.
Why you could detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Why third-party solutions are key to realising the benefits of Office 365
Research shows ongoing security concerns about email security in Office 365.Download
How to train staff on security 101
Trained employees are less likely to conduct damaging activities like clicking that dodgy link in an email, or overshare on social media.Download
Whitepaper: Using AI to revolutionise healthcare
Whitepaper: Making AI work for the healthcare sectorDownload
How UBanks, Seek and Carsales.com are harnessing the potential of AI
In this report, we take a look at three use cases – from employment marketplace, SEEK, from classifieds business Carsales.com and from online bank UBank – to explore how they’ve integrated AI, and what ROI they’ve seen since developing these capabilities.Click Here
Whitepaper: How many log messages are you losing to bad classification?
Operating systems, applications, and network devices generate text messages of the events that happen to them.Download
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
Are you all set to ride the new wave of technology disruption?
Why IT professionals are not immune to digital disruption.
Whitepaper: Filling your cloud technical skills gap
The study surveys more than 950 IT decision makers and 950 IT pros from across the globe to better understand the barriers to increasing cloud usage.Download
Acquia delivers open source framework for contextual commerce
The framework connects the Drupal open source web content management system with e-commerce platforms from Acquia partners.
Breaches are just mistakes that could have been prevented
Some IT managers blame breaches on mistakes, but only 40% train staff on security issues.Download
Involve the players, enjoy the game: Cyber resilience the right way
The most common threats are email-borne, so it makes sense to tackle that one.Download
Whitepaper: Gartner’s top picks for enterprise archiving services
The Magic Quadrant on Enterprise Information Archiving evaluates vendors on compliance, preservation, and discovery use cases.Download
Virtustream launches new services for cloud applications
The new suite of professional and managed services expands Virtustream’s enterprise application and services solutions.
Huawei and IBM rank top in new cloud market analysis
360Quadrants has released a managed services report that also names Atos and Accenture as leaders in its new managed services report.
Why cash is no longer king in Australia
Australia is leading the way in APAC for granting credit on B2B transactions.
Study: 'Inclusive design' key to serving customer diversity
Businesses that build products and services with an ‘inclusive’ design are more likely to reach four times the number of intended consumers than those that don’t.
Whitepaper: Evaluating VMware Cloud on AWS
VMware Cloud on AWS allows access to the range of AWS services as an extension of an existing VMware solution.Download
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Agility or risk? The security pain points causing tension in business
There’s tension in the workplace for businesses – and it’s all to do with the tradeoff between flexible working and cybersecurity.
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.Download
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
How open source distribution accelerates Drupal development time by 30%
Acquia Lightning has adopted Drupal’s support for JSON:API, delivering out-of-the-box support for building decoupled or headless applications.
Fujitsu and Veeam partner to offer simplified backup and recovery
This new partnership promises the increased availability of data and faster recovery from disasters and unplanned system downtime.