Exposure management starts with identity
The arduous, unglamorous and often invisible work of remediating Active Directory issues lacks appeal for most IT teams, but it is an imperative that it be done.
The hidden costs of not investing in 5G: Breaking down misperceptions for Australian IT buyers
5G is not just a technology upgrade, but a platform for innovation, resilience, and future growth.
AI-first telcos: agentic AI enables connectivity providers to perform intelligently
As connectivity becomes the backbone of economies and societies, telcos have both an opportunity and an obligation to lead the way.
Australia's new data centre rules could set a global standard
Australia is poised to become a regional hub for sustainable digital infrastructure.
The hidden legal risk in your AI workflow
Australia's new privacy tort just made your AI workflow a legal liability.
ATEN VP3520 Matrix Switch with Control
The ATEN VP3520 is designed to control AV devices such as displays and projectors, with an audio...
Cambium Networks XE3-4 access point with software-defined radio
The Cambium Networks XE3-4 access point with software-defined radio is designed for Wi-Fi, Wi-Fi...
The hidden legal risk in your AI workflow
Australia's new privacy tort just made your AI workflow a legal liability.
-
ACS backs digital productivity vision but urges action on AI regulation
Rather than promoting a wholesale rethink of AI regulation, ACS is calling for parallel progress,...
-
-
Oracle launches warehouse management tool
The Oracle Fusion Cloud Advanced Inventory Management tool is designed to help warehouse teams...
-
-
Tenable uses AI to further refine threat risk rating
Tenable has announced enhancements to its Tenable Vulnerability Priority Rating aimed at helping...
-

Exposure management starts with identity
The arduous, unglamorous and often invisible work of remediating Active Directory issues lacks appeal for most IT teams, but it is an imperative...
-
Accelerating the adoption of passkeys without compromising user experience
We need authentication methods that remove the human element from the equation, and that's...
-
-
Modern CISOs must throw out the traditional cybersecurity playbook
The primary imperative for today's CISOs should be to align the security agenda with business...
-
-
AI agents: securing the 'artificial workforce'
Just as they would with new employees, security teams will need to define access policies for...
-
Australia's new data centre rules could set a global standard
Australia is poised to become a regional hub for sustainable digital infrastructure.
-
AEMC drawing up new electricity connection rules to manage AI boom
New rules are under consideration to manage an expected influx of high-capacity data centres in...
-
-
LogicMonitor partners with OpenAI for DC management
LogicMonitor has arranged to integrate capabilities from OpenAI into its Edwin AI IT operations...
-
-
Kyndryl, Nokia launch expanded DC network portfolio
Kyndryl and Nokia have expanded their partnership to cover the delivery of an enhanced portfolio...
-