
Big Data | Cloud Computing | Cyber Security | Data Centres | Information | Security | Technology | December 14, 2015
Legacy data protection technologies: how to avoid being vulnerable
Data centres are meant to make businesses more efficient and their users more productive. It…

Innovation the key topic during talks with Israel PM
Bolstering Australia’s innovation sector was one of the key topics on the table when Minister…

Case Studies | Communication | Cyber Security | Information | Reports | Security | Technology | December 14, 2015
CenturyLink’s four security predictions for 2016
According to CenturyLink’s Australian Hybrid IT Adoption Index, more IT decision-makers are adopting the hybrid…
Case Studies | Communication | Cyber Security | Information | Reports | Security | Technology | December 11, 2015
Palo Alto Networks’ 6 cybersecurity predictions for Asia Pacific in 2016
1. Ransomware Ransomware will continue to evolve its methods of propagation, evasion techniques and continue…