Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | Technology | April 15, 2016 Planning for wireless LAN deployments Wireless communications are fast becomes the preferred access method for networked devices, with most organisations now using wireless local area… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | April 15, 2016 New report shows innovation at work Assistant Minister for Innovation Wyatt Roy has announced the release of the Australian Intellectual Property Report 2016, which provides a detailed… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Cyber Security Cyber Security | Information | Movers & Shakers | Reports | Security | Technology | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | April 13, 2016 Hewlett Packard Enterprise and NEC Join Forces to Accelerate Global Adoption of Mobile-First Networking Portfolio Expands on multi-year joint development in SDN and extends partnership to deliver improved networking options to enterprise customers across key… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Reports | Security | Technology | April 13, 2016 Lax wearables invade enterprise warns Centrify survey Centrify has released a survey warning that the presence of wearables in the enterprise poses a growing concern for IT… Read More Cloud Computing Cloud Computing | Cyber Security | Featured Stories | Information | Security | Technology | April 13, 2016 CenturyLink expands its cloud platform to Australia Launches CenturyLink Cloud node in Sydney to continue international expansion CenturyLink has announced the availability of CenturyLink Cloud in Australia. The… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Reports | Security | Technology | April 15, 2016 New report shows innovation at work Assistant Minister for Innovation Wyatt Roy has announced the release of the Australian Intellectual Property Report 2016, which provides a detailed… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Cyber Security Cyber Security | Information | Movers & Shakers | Reports | Security | Technology | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | April 13, 2016 Hewlett Packard Enterprise and NEC Join Forces to Accelerate Global Adoption of Mobile-First Networking Portfolio Expands on multi-year joint development in SDN and extends partnership to deliver improved networking options to enterprise customers across key… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Reports | Security | Technology | April 13, 2016 Lax wearables invade enterprise warns Centrify survey Centrify has released a survey warning that the presence of wearables in the enterprise poses a growing concern for IT… Read More Cloud Computing Cloud Computing | Cyber Security | Featured Stories | Information | Security | Technology | April 13, 2016 CenturyLink expands its cloud platform to Australia Launches CenturyLink Cloud node in Sydney to continue international expansion CenturyLink has announced the availability of CenturyLink Cloud in Australia. The… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Cyber Security Cyber Security | Information | Movers & Shakers | Reports | Security | Technology | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | April 13, 2016 Hewlett Packard Enterprise and NEC Join Forces to Accelerate Global Adoption of Mobile-First Networking Portfolio Expands on multi-year joint development in SDN and extends partnership to deliver improved networking options to enterprise customers across key… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Reports | Security | Technology | April 13, 2016 Lax wearables invade enterprise warns Centrify survey Centrify has released a survey warning that the presence of wearables in the enterprise poses a growing concern for IT… Read More Cloud Computing Cloud Computing | Cyber Security | Featured Stories | Information | Security | Technology | April 13, 2016 CenturyLink expands its cloud platform to Australia Launches CenturyLink Cloud node in Sydney to continue international expansion CenturyLink has announced the availability of CenturyLink Cloud in Australia. The… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Cyber Security Cyber Security | Information | Movers & Shakers | Reports | Security | Technology | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | April 13, 2016 Hewlett Packard Enterprise and NEC Join Forces to Accelerate Global Adoption of Mobile-First Networking Portfolio Expands on multi-year joint development in SDN and extends partnership to deliver improved networking options to enterprise customers across key… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Reports | Security | Technology | April 13, 2016 Lax wearables invade enterprise warns Centrify survey Centrify has released a survey warning that the presence of wearables in the enterprise poses a growing concern for IT… Read More Cloud Computing Cloud Computing | Cyber Security | Featured Stories | Information | Security | Technology | April 13, 2016 CenturyLink expands its cloud platform to Australia Launches CenturyLink Cloud node in Sydney to continue international expansion CenturyLink has announced the availability of CenturyLink Cloud in Australia. The… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Cyber Security Cyber Security | Information | Movers & Shakers | Reports | Security | Technology | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | April 13, 2016 Hewlett Packard Enterprise and NEC Join Forces to Accelerate Global Adoption of Mobile-First Networking Portfolio Expands on multi-year joint development in SDN and extends partnership to deliver improved networking options to enterprise customers across key… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Reports | Security | Technology | April 13, 2016 Lax wearables invade enterprise warns Centrify survey Centrify has released a survey warning that the presence of wearables in the enterprise poses a growing concern for IT… Read More Cloud Computing Cloud Computing | Cyber Security | Featured Stories | Information | Security | Technology | April 13, 2016 CenturyLink expands its cloud platform to Australia Launches CenturyLink Cloud node in Sydney to continue international expansion CenturyLink has announced the availability of CenturyLink Cloud in Australia. The… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Cyber Security Cyber Security | Information | Movers & Shakers | Reports | Security | Technology | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | April 13, 2016 Hewlett Packard Enterprise and NEC Join Forces to Accelerate Global Adoption of Mobile-First Networking Portfolio Expands on multi-year joint development in SDN and extends partnership to deliver improved networking options to enterprise customers across key… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Reports | Security | Technology | April 13, 2016 Lax wearables invade enterprise warns Centrify survey Centrify has released a survey warning that the presence of wearables in the enterprise poses a growing concern for IT… Read More Cloud Computing Cloud Computing | Cyber Security | Featured Stories | Information | Security | Technology | April 13, 2016 CenturyLink expands its cloud platform to Australia Launches CenturyLink Cloud node in Sydney to continue international expansion CenturyLink has announced the availability of CenturyLink Cloud in Australia. The… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Communication Communication | Cyber Security | Movers & Shakers | Security | April 13, 2016 Hewlett Packard Enterprise and NEC Join Forces to Accelerate Global Adoption of Mobile-First Networking Portfolio Expands on multi-year joint development in SDN and extends partnership to deliver improved networking options to enterprise customers across key… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Reports | Security | Technology | April 13, 2016 Lax wearables invade enterprise warns Centrify survey Centrify has released a survey warning that the presence of wearables in the enterprise poses a growing concern for IT… Read More Cloud Computing Cloud Computing | Cyber Security | Featured Stories | Information | Security | Technology | April 13, 2016 CenturyLink expands its cloud platform to Australia Launches CenturyLink Cloud node in Sydney to continue international expansion CenturyLink has announced the availability of CenturyLink Cloud in Australia. The… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next
Case Studies Case Studies | Cloud Computing | Cyber Security | Reports | Security | Technology | April 13, 2016 Lax wearables invade enterprise warns Centrify survey Centrify has released a survey warning that the presence of wearables in the enterprise poses a growing concern for IT… Read More Cloud Computing Cloud Computing | Cyber Security | Featured Stories | Information | Security | Technology | April 13, 2016 CenturyLink expands its cloud platform to Australia Launches CenturyLink Cloud node in Sydney to continue international expansion CenturyLink has announced the availability of CenturyLink Cloud in Australia. The… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next
Cloud Computing Cloud Computing | Cyber Security | Featured Stories | Information | Security | Technology | April 13, 2016 CenturyLink expands its cloud platform to Australia Launches CenturyLink Cloud node in Sydney to continue international expansion CenturyLink has announced the availability of CenturyLink Cloud in Australia. The… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next
Case Studies Case Studies | Cyber Security | Information | Reports | Security | April 13, 2016 One New Zero-Day Discovered on Average Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities –Australia is the number one target for ransomware attacks in the Southern Hemisphere– Symantec’s Internet Security Threat Report (ISTR), Volume 21,… Read More Previous 1 … 124 125 126 127 128 … 180 Next