Articles
Understanding software-defined storage
Addressing cost and flexibility challenges means embracing a modern, future-facing digital infrastructure such as software-defined storage (SDS). [ + ]
A data-centric security approach
Database security measures are often retrofitted from solutions designed for other threats, but this approach is no longer a viable solution. [ + ]
The future of work: GenAI and enterprise
How can businesses harness the potential power of this truly transformative technology and to what end? [ + ]
Next-gen wireless network for PCEC
Perth Convention and Exhibition Centre has selected Hewlett Packard Enterprise HPE Aruba Networking to deliver state-of-the-art connectivity. [ + ]
Four ways to lower cyber insurance premiums
As insurers attempt to quantify and control loss, security postures are under scrutiny, meaning new tools are needed to ensure cyber insurance eligibility. [ + ]
Revolutionising network security
The hybrid mesh firewall is an integrated collection of next-generation firewalls that are fast becoming the new standard in enterprise IT security. [ + ]
Combining ZTNA and the right network hardware to secure your IoT environment
Despite a lack of formal regulation on business IoT security, it's important for organisations to secure IoT devices, thereby protecting networks. [ + ]
Monitoring ESG goals as a key organisational focus
Sustainability isn't just a passive beneficiary of digital transformation; it actively fuels the impetus for businesses to embark on digital journeys. [ + ]
Beyond the hype: AI and enterprise data
From big data to cloud data and now hybrid data, complex data management may be a major barrier for organisations looking to leverage AI. [ + ]
AI in physical security
Knowing where AI fits and how it can and should be leveraged means we need to examine its potential use cases, risks and shared responsibility. [ + ]
Cutting costs of digital downtime with observability
In today's rapidly evolving tech landscape, observability is an indispensable tool for understanding and managing complex environments. [ + ]
Threat spotlight: Attackers use inbox rules to evade detection
A new report from Barracuda Networks shows how attackers work by forwarding sensitive emails, hiding security alerts and monitoring victim activities. [ + ]
Rising pressure to manage third-party cybersecurity risks
APRA has put the spotlight on the need for financial institutions to better manage the risk of cyber attacks via third parties. [ + ]
The positives of PaaS on private cloud
As lessons are learned about operating in public clouds, other 'flavours' of cloud are emerging as superior options. [ + ]
Young workers demand better technology
New research reveals that the retirement of baby boomers and rise of 'digital natives' will heighten employee expectations around workplace tech. [ + ]