Australia's leading source of security and threat news
Kai Ping Lew
These search results are from across the Techday network of sites
How to avoid a digital transformation fiasco – Nintex
Australia’s public and private sectors alike racing to embrace digital technologies, to keep the customer satisfied and realise efficiency dividends.
How perfect visibility lets MSPs do more with less
A cohesive RMM, PSA, and IT Documentation solution enables you to manage all essential MSP functions from a single pane of glass.
How to take your job search to the next level
What can you do to make sure you get the attention you deserve in your job search?
Moving to a low-code content future - Hyland
What was once a case of ‘build once, update seldom’ has changed to the point where constant pressure requires software to continuously evolve.
Why healthcare organisations must examine their network visibility - ExtraHop
Hackers and cyber criminals place a high value on the patient data healthcare providers have in their records.
Making secure SD-WAN possible with a comprehensive approach - Fortinet
SD-WAN is changing the way enterprises offer access to branch offices - but securing SD-WAN can be challenging.
Telcos must step up with stronger protections on user data – Fortinet
The capability for service providers to up their security game is in place right now and New Zealand telcos and ISPs don’t need to stop at personal protection.
Fortinet paves the way for digital transformation in the channel
Digital transformation is is changing the way businesses engage with customers and staff and the way they create and deliver value.
Simplifying collaboration in the changing workplace
Continuing advancements in technology and the rapid speed of delivery are driving incredible change in today’s workplaces.
Cloud security changing security channel partner model - Zscaler
Channel partners need to carve out their own space and convince enterprise customers that they are the best avenue to procure cloud services.
On the shoulders of open source, cloud stands tall – BlackLine
Open source changed software development, but its impact could pale in comparison to the public cloud, writes Pete Hirsch.
Successful threat hunting requires curation & collaboration
Many organizations already have the technology required for threat hunting, with SIEMs and threat intelligence a starting point.
Schneider Electric’s key considerations for deploying a hybrid data centre
Pod frame architectures and liquid cooling can greatly improve the efficiency of hybrid IT applications.
10 ways to benefit from the emerging ‘data nation’ - Snowflake
Data is opening up new opportunities for revenue generation that can significantly boost the corporate bottom line.
Case study: Kemp load balancers resolve issues for Now IT
Now IT faced a problem when its load balancer was unable to share information with AWS’ relational database, or access Microsoft Exchange.
The rise of document databases - MongoDB
one of the most popular and flexible ways of storing data is via a document data model, where each record and its associated data is thought of as a “document”
Four misconceptions about open source technology - Acquia
Despite widespread adoption around the globe, open source technology continues to generate questions about its security and performance.
Caution needed in AI implementation for A/NZ businesses
Moving slowly and prudently towards the adoption of AI solutions is a strategy that’s likely to serve an organisation better than a fast-paced embrace of AI-centric architecture.
Why finance and IT must work together to implement RPA
In the accounting department, robotic process automation sees automation software running on a workstation perform many of the tasks formerly carried out by accountants.
Why next-gen CRMs need real-time data for forecasting
The problem is that many finance departments are still stuck making important business decisions based on last quarters’ numbers.
Where cloud migrations still come unstuck - ThousandEyes
It’s not just code that needs refactoring for the move to cloud.
Riding the frictionless wave with cloud-based apps – Talend
The term has been co-opted in recent years to describe the phenomenon of commercial processes which appear to work smoothly and effortlessly.
Key threats businesses must be vigilant against – LogRhythm
At home and abroad, companies anticipate cyber-crime will be the most disruptive economic crime of 2019 and 2020.
Protecting organisations from insider threats - Bitglass
The biggest challenge for most external threat actors is gaining access to a target organisation, but insider threats already have this.