Defensive security is a challenging job. The individuals on the front lines of this defense—blue teams and Security Operations Center (SOC) engineers— shoulder the critical responsibilities of cataloging and protecting systems and devices, managing vulnerabilities, continuously monitoring, and responding to endless threats.
Adam LePeilbet, Senior Director & General Manager, Data Centre Sales, Dell Technologies, ANZ
GUEST OPINION: A solid, well-planned IT infrastructure is a bit like having good plumbing in your home. If the pipes don’t work, there’s little point in installing a state-of-the-art bathroom with marble tiles, jacuzzi bath and a power shower.
GUEST OPINION: While it never went away entirely, there's a resurgence in unsanctioned cloud apps and services in enterprise environments – and nuanced action from IT teams is required to address it.
GUEST OPINION: Pandemic restrictions have caused big changes within many Australian businesses, and one of the most significant has been a rapid increase in the adoption of cloud resources and services.
GUEST OPINION: For many organisations, creating an effective data protection strategy to support the adoption of remote work and cloud infrastructure is becoming increasingly urgent.
By Stephen Sims, CEO, Brennan IT
SPONSORED NEWS. With more options for the technology stack than ever before, each allegedly offering bigger and bolder returns, efficiencies, and optimisations; it stands to reason that Australian organisations would be sitting pretty on their digital transformation journeys.
By Stephen Sims, CEO, Brennan IT
SPONSORED NEWS. With more options for the technology stack than ever before, each allegedly offering bigger and bolder returns, efficiencies, and optimisations; it stands to reason that Australian organisations would be sitting pretty on their digital transformation journeys.
A recent survey by digital workplace solutions provider Igloo found that a significant portion of employees at any workplace would "upgrade" their software environment in order to actually get their job done, with obvious security implications.
Cloud access security broker provider Netskope has raised US$231.4 million in funding, but says its goals are not to be acquired but to be a key long-term cyber-security player.
"The credit card is mightier than the firewall," says Netskope's Scott Hogrefe, referencing the ease in which conventional IT departments can be short-circuited, staff signing up for cloud-based services as and when needed.
Millennials, a.k.a. Gen Y, Net Generation, or Generation Now. Regardless of what you call them the infamous millennial characteristics are trying the patience of enterprise network security.
A new Australian survey shows that corporate users are avoiding VPNs despite being requested to use them for secure access to corporate networks and data.
CTO, CIO, CISO and IT administrators must grapple with and gain control of Shadow IT – BYO devices and often insecure or inappropriate consumer software being used covertly in the enterprise workspace.
First it was shadow IT software, and now it Is shadow IT assets – both can have the same devastating effect on the best-laid enterprise security plans.
CIOs appear to have been through a tough period where they were increasingly marginalised from IT purchasing decision making in their businesses, according to a new survey which reveals that line of business executives had been bypassing their IT departments and CIOs when making IT investments.
The dark, hidden world of Shadow IT where IT systems and solutions are often built and used within organisation’s without explicit approval of the organisation, including IT management, is becoming more prevalent in Australia and New Zealand as cloud adoption picks up.
The growing practice of Shadow IT – where departments within companies and organisations buy their own IT solutions and bypass the internal IT people – has inadvertently created a new, leading role for CIOs, according to a newly published study.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]