Case Studies Case Studies | Cyber Security | Reports | Security | June 22, 2016 Ovum Publishes SWOT Analysis of Arbor Networks Spectrum v2.1 Evaluating the Network-based Approach to Advanced Threat Protection Arbor Networks has announced that leading global telecoms analyst firm Ovum has published… Read More Cyber Security Cyber Security | Information | Security | June 20, 2016 Locky, Dridex, and Angler among cybercrime groups to experience fall in activity Symantec has uncovered a sudden decline in activity amongst key malware groups in the past few weeks, including the widely… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Data Centres | Reports | Security | June 20, 2016 Survey Finds More Than One in Ten Australian Workers Bypassing Secure VPN to Access Internet More than 70 percent of organisations have at least 25 per cent of their employees accessing enterprise business applications and… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | June 17, 2016 The three pillars of effective disaster recovery Like most areas of IT infrastructure today, disaster recovery is undergoing constant change and evolution. The principal agents for change… Read More Case Studies Case Studies | Cyber Security | Data Centres | Information | Movers & Shakers | Security | June 17, 2016 ISACA Provides Direction for Achieving Business Benefits New Guide Outlines How COBIT Can Help Global IT association ISACA has laid out comprehensive strategy for how organisations can… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | Technology | June 15, 2016 2degrees and NEC New Zealand to collaborate on Smart Cities 2degrees CEO Stewart Sherriff and NEC’s Katsuhiro Ito sign an agreement to collaborate on smart cities. Two Degrees Mobile Limited… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | June 15, 2016 Unisys to Expand Global Alliance with Microsoft on Cloud Security Companies to deliver newly-interoperable technology for public and private sectors, intend to develop new solutions to increase cyber security in… Read More Cyber Security Cyber Security | Information | Security | June 15, 2016 Ixia transforms development life cycle for software developers New Ixia Developer solution reduces development risks and costs; speeds time to deployment Ixia has announced the addition of Ixia Developer to… Read More Cloud Computing Cloud Computing | Cyber Security | Security | June 15, 2016 Don’t Make “Cloud” an Excuse for Bad Planning by Tony Campbell, ChiefIT Correspondent Why does it take a catastrophic event like the Amazon Web Services (AWS) Sydney outage… Read More Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Cyber Security Cyber Security | Information | Security | June 20, 2016 Locky, Dridex, and Angler among cybercrime groups to experience fall in activity Symantec has uncovered a sudden decline in activity amongst key malware groups in the past few weeks, including the widely… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Data Centres | Reports | Security | June 20, 2016 Survey Finds More Than One in Ten Australian Workers Bypassing Secure VPN to Access Internet More than 70 percent of organisations have at least 25 per cent of their employees accessing enterprise business applications and… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | June 17, 2016 The three pillars of effective disaster recovery Like most areas of IT infrastructure today, disaster recovery is undergoing constant change and evolution. The principal agents for change… Read More Case Studies Case Studies | Cyber Security | Data Centres | Information | Movers & Shakers | Security | June 17, 2016 ISACA Provides Direction for Achieving Business Benefits New Guide Outlines How COBIT Can Help Global IT association ISACA has laid out comprehensive strategy for how organisations can… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | Technology | June 15, 2016 2degrees and NEC New Zealand to collaborate on Smart Cities 2degrees CEO Stewart Sherriff and NEC’s Katsuhiro Ito sign an agreement to collaborate on smart cities. Two Degrees Mobile Limited… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | June 15, 2016 Unisys to Expand Global Alliance with Microsoft on Cloud Security Companies to deliver newly-interoperable technology for public and private sectors, intend to develop new solutions to increase cyber security in… Read More Cyber Security Cyber Security | Information | Security | June 15, 2016 Ixia transforms development life cycle for software developers New Ixia Developer solution reduces development risks and costs; speeds time to deployment Ixia has announced the addition of Ixia Developer to… Read More Cloud Computing Cloud Computing | Cyber Security | Security | June 15, 2016 Don’t Make “Cloud” an Excuse for Bad Planning by Tony Campbell, ChiefIT Correspondent Why does it take a catastrophic event like the Amazon Web Services (AWS) Sydney outage… Read More Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cloud Computing | Cyber Security | Data Centres | Reports | Security | June 20, 2016 Survey Finds More Than One in Ten Australian Workers Bypassing Secure VPN to Access Internet More than 70 percent of organisations have at least 25 per cent of their employees accessing enterprise business applications and… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | June 17, 2016 The three pillars of effective disaster recovery Like most areas of IT infrastructure today, disaster recovery is undergoing constant change and evolution. The principal agents for change… Read More Case Studies Case Studies | Cyber Security | Data Centres | Information | Movers & Shakers | Security | June 17, 2016 ISACA Provides Direction for Achieving Business Benefits New Guide Outlines How COBIT Can Help Global IT association ISACA has laid out comprehensive strategy for how organisations can… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | Technology | June 15, 2016 2degrees and NEC New Zealand to collaborate on Smart Cities 2degrees CEO Stewart Sherriff and NEC’s Katsuhiro Ito sign an agreement to collaborate on smart cities. Two Degrees Mobile Limited… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | June 15, 2016 Unisys to Expand Global Alliance with Microsoft on Cloud Security Companies to deliver newly-interoperable technology for public and private sectors, intend to develop new solutions to increase cyber security in… Read More Cyber Security Cyber Security | Information | Security | June 15, 2016 Ixia transforms development life cycle for software developers New Ixia Developer solution reduces development risks and costs; speeds time to deployment Ixia has announced the addition of Ixia Developer to… Read More Cloud Computing Cloud Computing | Cyber Security | Security | June 15, 2016 Don’t Make “Cloud” an Excuse for Bad Planning by Tony Campbell, ChiefIT Correspondent Why does it take a catastrophic event like the Amazon Web Services (AWS) Sydney outage… Read More Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Security | Technology | June 17, 2016 The three pillars of effective disaster recovery Like most areas of IT infrastructure today, disaster recovery is undergoing constant change and evolution. The principal agents for change… Read More Case Studies Case Studies | Cyber Security | Data Centres | Information | Movers & Shakers | Security | June 17, 2016 ISACA Provides Direction for Achieving Business Benefits New Guide Outlines How COBIT Can Help Global IT association ISACA has laid out comprehensive strategy for how organisations can… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | Technology | June 15, 2016 2degrees and NEC New Zealand to collaborate on Smart Cities 2degrees CEO Stewart Sherriff and NEC’s Katsuhiro Ito sign an agreement to collaborate on smart cities. Two Degrees Mobile Limited… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | June 15, 2016 Unisys to Expand Global Alliance with Microsoft on Cloud Security Companies to deliver newly-interoperable technology for public and private sectors, intend to develop new solutions to increase cyber security in… Read More Cyber Security Cyber Security | Information | Security | June 15, 2016 Ixia transforms development life cycle for software developers New Ixia Developer solution reduces development risks and costs; speeds time to deployment Ixia has announced the addition of Ixia Developer to… Read More Cloud Computing Cloud Computing | Cyber Security | Security | June 15, 2016 Don’t Make “Cloud” an Excuse for Bad Planning by Tony Campbell, ChiefIT Correspondent Why does it take a catastrophic event like the Amazon Web Services (AWS) Sydney outage… Read More Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Data Centres | Information | Movers & Shakers | Security | June 17, 2016 ISACA Provides Direction for Achieving Business Benefits New Guide Outlines How COBIT Can Help Global IT association ISACA has laid out comprehensive strategy for how organisations can… Read More Communication Communication | Cyber Security | Movers & Shakers | Security | Technology | June 15, 2016 2degrees and NEC New Zealand to collaborate on Smart Cities 2degrees CEO Stewart Sherriff and NEC’s Katsuhiro Ito sign an agreement to collaborate on smart cities. Two Degrees Mobile Limited… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | June 15, 2016 Unisys to Expand Global Alliance with Microsoft on Cloud Security Companies to deliver newly-interoperable technology for public and private sectors, intend to develop new solutions to increase cyber security in… Read More Cyber Security Cyber Security | Information | Security | June 15, 2016 Ixia transforms development life cycle for software developers New Ixia Developer solution reduces development risks and costs; speeds time to deployment Ixia has announced the addition of Ixia Developer to… Read More Cloud Computing Cloud Computing | Cyber Security | Security | June 15, 2016 Don’t Make “Cloud” an Excuse for Bad Planning by Tony Campbell, ChiefIT Correspondent Why does it take a catastrophic event like the Amazon Web Services (AWS) Sydney outage… Read More Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Communication Communication | Cyber Security | Movers & Shakers | Security | Technology | June 15, 2016 2degrees and NEC New Zealand to collaborate on Smart Cities 2degrees CEO Stewart Sherriff and NEC’s Katsuhiro Ito sign an agreement to collaborate on smart cities. Two Degrees Mobile Limited… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | June 15, 2016 Unisys to Expand Global Alliance with Microsoft on Cloud Security Companies to deliver newly-interoperable technology for public and private sectors, intend to develop new solutions to increase cyber security in… Read More Cyber Security Cyber Security | Information | Security | June 15, 2016 Ixia transforms development life cycle for software developers New Ixia Developer solution reduces development risks and costs; speeds time to deployment Ixia has announced the addition of Ixia Developer to… Read More Cloud Computing Cloud Computing | Cyber Security | Security | June 15, 2016 Don’t Make “Cloud” an Excuse for Bad Planning by Tony Campbell, ChiefIT Correspondent Why does it take a catastrophic event like the Amazon Web Services (AWS) Sydney outage… Read More Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | June 15, 2016 Unisys to Expand Global Alliance with Microsoft on Cloud Security Companies to deliver newly-interoperable technology for public and private sectors, intend to develop new solutions to increase cyber security in… Read More Cyber Security Cyber Security | Information | Security | June 15, 2016 Ixia transforms development life cycle for software developers New Ixia Developer solution reduces development risks and costs; speeds time to deployment Ixia has announced the addition of Ixia Developer to… Read More Cloud Computing Cloud Computing | Cyber Security | Security | June 15, 2016 Don’t Make “Cloud” an Excuse for Bad Planning by Tony Campbell, ChiefIT Correspondent Why does it take a catastrophic event like the Amazon Web Services (AWS) Sydney outage… Read More Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next
Cyber Security Cyber Security | Information | Security | June 15, 2016 Ixia transforms development life cycle for software developers New Ixia Developer solution reduces development risks and costs; speeds time to deployment Ixia has announced the addition of Ixia Developer to… Read More Cloud Computing Cloud Computing | Cyber Security | Security | June 15, 2016 Don’t Make “Cloud” an Excuse for Bad Planning by Tony Campbell, ChiefIT Correspondent Why does it take a catastrophic event like the Amazon Web Services (AWS) Sydney outage… Read More Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next
Cloud Computing Cloud Computing | Cyber Security | Security | June 15, 2016 Don’t Make “Cloud” an Excuse for Bad Planning by Tony Campbell, ChiefIT Correspondent Why does it take a catastrophic event like the Amazon Web Services (AWS) Sydney outage… Read More Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next
Communication Communication | Cyber Security | Movers & Shakers | Reports | Security | June 15, 2016 From Australia to Cyberia Australians connect and learn through AICC May CyberSecurity delegation to Israel, led by David Irvine AO (sponsored by ECU and… Read More Previous 1 … 85 86 87 88 89 … 159 Next