Why the success of modern cyber defence hinges on identity security
A single compromised identity could easily provide the keys to the kingdom if it isn't properly secured.
Navigating the evolution of data in the age of generative AI
As businesses tackle the intricacies of data management amid the rise of GenAI, embracing a proactive and comprehensive strategy becomes imperative.
Emergency onboarding: what to do before and after a data breach
Organisations that have an emergency onboarding plan are better positioned to have their business back up and running quickly in the event of a data breach.
Savvy directors are demanding more points of proof when cyber incidents occur
Pre-agreement on what a post-incident forensics effort should produce — and testing it out before use — is now 'table stakes' for incident response.
Cyber-attack prevention is better than a cure
Corporate and political decision-makers need to invest in areas that do a better job of protecting Australians online and our future economic prosperity.
WTI Advanced Remote Edge Manager
The Advanced Remote Edge Manager is a compact out-of-band (OOB) management solution for...
ATEN CS22H Series Cable KVM Switch
The CS22H 2-Port USB 4K HDMI Cable KVM Switch with Remote Port Selector enables users to access...
Navigating the evolution of data in the age of generative AI
As businesses tackle the intricacies of data management amid the rise of GenAI, embracing a proactive and comprehensive strategy becomes imperative.
-
Australian businesses link sustainability and profit
More than two-thirds of Australian business leaders polled by SAP see a moderate to strong link...
-
-
AI transforming service role for ANZ organisations
New research released by Salesforce seeks to quantify the impact the AI revolution is having on...
-
-
Kyndryl launches AI consulting and managed services
Kyndryl's new AI-based consulting and managed delivery services aim to help customers...
-
Why the success of modern cyber defence hinges on identity security
A single compromised identity could easily provide the keys to the kingdom if it isn't properly secured.
-
Emergency onboarding: what to do before and after a data breach
Organisations that have an emergency onboarding plan are better positioned to have their business...
-
-
Savvy directors are demanding more points of proof when cyber incidents occur
Pre-agreement on what a post-incident forensics effort should produce — and testing it out...
-
-
Cyber-attack prevention is better than a cure
Corporate and political decision-makers need to invest in areas that do a better job of...
-
Revolutionising connectivity: the trends redefining data centres in 2024
The rush of generative AI has hit the IT ecosystem hard.
-
OVHcloud opens water-cooled DC in Sydney
OVHcloud's third data centre in Sydney uses technology that can cool a server with the...
-
-
Australian data centre market facing supply constraints
Construction delays as well as shortages of suitable land could lead to ongoing shortages in...
-
-
ResetData launches liquid cooling test lab
ResetData's new liquid cooling test and simulation lab in the Sydney CBD will allow customers...
-