Communication Communication | Cyber Security | Movers & Shakers | Security | Technology | April 20, 2016 CSC Signs Three-year Contract with Transport for NSW Provision of Network Managed Services across 1,200 sites CSC has announced it has signed a three-year contract with Transport for… Read More Cloud Computing Cloud Computing | Cyber Security | Data Centres | Movers & Shakers | Security | Technology | April 20, 2016 OneSecure Acquired by EvvoLabs, Rebrands as EVVO Cybersecurity Acquisition of OneSecure to see comprehensive suite of services and solutions available for existing customers OneSecure Asia has announced that it has… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Urgent Call to Action: Uninstall QuickTime for Windows Today We’re putting the word out that everyone should follow Apple’s guidance and uninstall QuickTime for Windows as soon as possible.… Read More Cloud Computing Cloud Computing | Cyber Security | Information | Security | Technology | April 15, 2016 Blue Coat Launches Broad Cloud Security Ecosystem Cloud ready partner program aimed at easing enterprise cloud migration and decreasing risk; enables integration of services and applications to… Read More Cloud Computing Cloud Computing | Cyber Security | Information | Security | Technology | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | Technology | April 15, 2016 Planning for wireless LAN deployments Wireless communications are fast becomes the preferred access method for networked devices, with most organisations now using wireless local area… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | April 15, 2016 New report shows innovation at work Assistant Minister for Innovation Wyatt Roy has announced the release of the Australian Intellectual Property Report 2016, which provides a detailed… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Cloud Computing Cloud Computing | Cyber Security | Data Centres | Movers & Shakers | Security | Technology | April 20, 2016 OneSecure Acquired by EvvoLabs, Rebrands as EVVO Cybersecurity Acquisition of OneSecure to see comprehensive suite of services and solutions available for existing customers OneSecure Asia has announced that it has… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Urgent Call to Action: Uninstall QuickTime for Windows Today We’re putting the word out that everyone should follow Apple’s guidance and uninstall QuickTime for Windows as soon as possible.… Read More Cloud Computing Cloud Computing | Cyber Security | Information | Security | Technology | April 15, 2016 Blue Coat Launches Broad Cloud Security Ecosystem Cloud ready partner program aimed at easing enterprise cloud migration and decreasing risk; enables integration of services and applications to… Read More Cloud Computing Cloud Computing | Cyber Security | Information | Security | Technology | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | Technology | April 15, 2016 Planning for wireless LAN deployments Wireless communications are fast becomes the preferred access method for networked devices, with most organisations now using wireless local area… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | April 15, 2016 New report shows innovation at work Assistant Minister for Innovation Wyatt Roy has announced the release of the Australian Intellectual Property Report 2016, which provides a detailed… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Urgent Call to Action: Uninstall QuickTime for Windows Today We’re putting the word out that everyone should follow Apple’s guidance and uninstall QuickTime for Windows as soon as possible.… Read More Cloud Computing Cloud Computing | Cyber Security | Information | Security | Technology | April 15, 2016 Blue Coat Launches Broad Cloud Security Ecosystem Cloud ready partner program aimed at easing enterprise cloud migration and decreasing risk; enables integration of services and applications to… Read More Cloud Computing Cloud Computing | Cyber Security | Information | Security | Technology | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | Technology | April 15, 2016 Planning for wireless LAN deployments Wireless communications are fast becomes the preferred access method for networked devices, with most organisations now using wireless local area… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | April 15, 2016 New report shows innovation at work Assistant Minister for Innovation Wyatt Roy has announced the release of the Australian Intellectual Property Report 2016, which provides a detailed… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Cloud Computing Cloud Computing | Cyber Security | Information | Security | Technology | April 15, 2016 Blue Coat Launches Broad Cloud Security Ecosystem Cloud ready partner program aimed at easing enterprise cloud migration and decreasing risk; enables integration of services and applications to… Read More Cloud Computing Cloud Computing | Cyber Security | Information | Security | Technology | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | Technology | April 15, 2016 Planning for wireless LAN deployments Wireless communications are fast becomes the preferred access method for networked devices, with most organisations now using wireless local area… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | April 15, 2016 New report shows innovation at work Assistant Minister for Innovation Wyatt Roy has announced the release of the Australian Intellectual Property Report 2016, which provides a detailed… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Cloud Computing Cloud Computing | Cyber Security | Information | Security | Technology | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | Technology | April 15, 2016 Planning for wireless LAN deployments Wireless communications are fast becomes the preferred access method for networked devices, with most organisations now using wireless local area… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | April 15, 2016 New report shows innovation at work Assistant Minister for Innovation Wyatt Roy has announced the release of the Australian Intellectual Property Report 2016, which provides a detailed… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Cloud Computing Cloud Computing | Communication | Cyber Security | Information | Security | Technology | April 15, 2016 Planning for wireless LAN deployments Wireless communications are fast becomes the preferred access method for networked devices, with most organisations now using wireless local area… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | April 15, 2016 New report shows innovation at work Assistant Minister for Innovation Wyatt Roy has announced the release of the Australian Intellectual Property Report 2016, which provides a detailed… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Reports | Security | Technology | April 15, 2016 New report shows innovation at work Assistant Minister for Innovation Wyatt Roy has announced the release of the Australian Intellectual Property Report 2016, which provides a detailed… Read More Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next
Case Studies Case Studies | Cyber Security | Information | Security | April 15, 2016 Badlock, bad news or good? At time when everything comes nice and neatly packaged delivered to your door by person or drone, even vulnerabilities now… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next
Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next
Case Studies Case Studies | Cyber Security | Data Centres | Reports | Security | April 13, 2016 Global Study Finds an Ecosystem-based Strategy Lowers Fraud Levels in Programmatic Advertising One-third of marketing and advertising technology professionals are willing to move applications to a new data centre to reduce latency… Read More Previous 1 … 131 132 133 134 135 … 187 Next