|
GUEST OPINION: Pandemic restrictions have caused big changes within many Australian businesses, and one of the most significant has been a rapid increase in the adoption of cloud resources and services.
GUEST OPINION: For many organisations, creating an effective data protection strategy to support the adoption of remote work and cloud infrastructure is becoming increasingly urgent.
By Stephen Sims, CEO, Brennan IT
SPONSORED NEWS. With more options for the technology stack than ever before, each allegedly offering bigger and bolder returns, efficiencies, and optimisations; it stands to reason that Australian organisations would be sitting pretty on their digital transformation journeys.
By Stephen Sims, CEO, Brennan IT
SPONSORED NEWS. With more options for the technology stack than ever before, each allegedly offering bigger and bolder returns, efficiencies, and optimisations; it stands to reason that Australian organisations would be sitting pretty on their digital transformation journeys.
A recent survey by digital workplace solutions provider Igloo found that a significant portion of employees at any workplace would "upgrade" their software environment in order to actually get their job done, with obvious security implications.
Cloud access security broker provider Netskope has raised US$231.4 million in funding, but says its goals are not to be acquired but to be a key long-term cyber-security player.
"The credit card is mightier than the firewall," says Netskope's Scott Hogrefe, referencing the ease in which conventional IT departments can be short-circuited, staff signing up for cloud-based services as and when needed.
Millennials, a.k.a. Gen Y, Net Generation, or Generation Now. Regardless of what you call them the infamous millennial characteristics are trying the patience of enterprise network security.
A new Australian survey shows that corporate users are avoiding VPNs despite being requested to use them for secure access to corporate networks and data.
CTO, CIO, CISO and IT administrators must grapple with and gain control of Shadow IT – BYO devices and often insecure or inappropriate consumer software being used covertly in the enterprise workspace.
First it was shadow IT software, and now it Is shadow IT assets – both can have the same devastating effect on the best-laid enterprise security plans.
CIOs appear to have been through a tough period where they were increasingly marginalised from IT purchasing decision making in their businesses, according to a new survey which reveals that line of business executives had been bypassing their IT departments and CIOs when making IT investments.
The dark, hidden world of Shadow IT where IT systems and solutions are often built and used within organisation’s without explicit approval of the organisation, including IT management, is becoming more prevalent in Australia and New Zealand as cloud adoption picks up.
The growing practice of Shadow IT – where departments within companies and organisations buy their own IT solutions and bypass the internal IT people – has inadvertently created a new, leading role for CIOs, according to a newly published study.
I would love to know if it has the equivalent of the HP E-print. That was such a great feature[…]
I wonder what ACMA is going to do to help those people who are disadvantaged? Send out inspirational messages to[…]
The link to Vodafone in the article links to the Vodafone group website in the UK, not the Australian site.[…]
Just for a start the removal of copper from the system will mean that the NBN will be a better[…]
Linux is becoming worse than Windows. :-(