Australia's leading source of security and threat news
Kai Ping Lew
These search results are from across the Techday network of sites
Why AI algorithms are only as good as the data they’re fed - Snowflake
If this data is of poor quality or contains bias, this will have a significant impact on subsequent decisions made by the software.
Overcoming deepfakes with deep learning
In the past couple of weeks, there have been high-profile examples of deepfakes, where deep learning, an advanced subset of AI, is used to manipulate videos to create fake videos.
Protecting remote staff from phishing attacks – WatchGuard
Close to 50% of Australian employees worked remotely for at least half the time, according to a 2018 survey by IWG.
Interview: Node4's CEO talks SaaS, stack, DX, and colocation
DataCentreNews EMEA recently spoke with Node4’s CEO, Andy Gilbert, at Techfest, an event hosted by Node4 as part of London Tech Week.
Who is really responsible for cloud security?
The joy and the temptation of SaaS is that it is so easy to buy without IT even needing to be involved.
How to stop your data from getting hijacked - SolarWinds
Organisations often struggle to avoid man-in-the-middle attacks because hackers target infrastructure the organisation has almost no control over.
Cybersecurity: Starting with the human factor
In a recent report by Dell EMC, it was discovered that data-loss incidents cost Singapore organisations an average of US$1.4 million over 12 months.
Q&A: Aruba optimises UX through network monitoring
UXI enables IT teams responsible for managing networks, such as office spaces, healthcare facilities and schools, to simulate real-world network usage experiences.
Using data to drive decision-making in the digital era – BOARD International
Business intelligence tools can be useful aids for executives weighing up their options and deciding which way to jump.
Security risks of neglecting the workforce experience – Avaya
Government departments and enterprises are wasting millions of dollars every year on cybersecurity because they fail to also invest in the user experience.
Data challenges to growth in the APAC region
In order to meet and ultimately overcome data challenges throughout the APAC region, industries must address their current storage solutions.
Infor: Future-proofing the supply chain
Technology can help provide the necessary insights to make smart decisions and take proactive stances.
How flexible identity systems support mobile working – Ping Identity
Increased time outside of the official workplace has become the reality of working life for employees in a rapidly digitising economy.
The evolution of network programming
To describe development stages as “evolution” makes it sound too smooth and easy because, in practice, each step-change results in severe industry dislocations.
Redefining power and energy for smart cities
How can we sustainably power the cities of tomorrow? The answers might lie in relooking some central components of smart cities – data centers, electrical vehicles (EVs) and smart homes.
Meeting the card payment industry’s compliance requirements - Kemp
Combating CNP (card not present) fraud has become a key priority across the entire e-commerce community.
Transforming disaster recovery with AI & self-driving backup
Fortunately, self-driving backup and recovery is now possible through the power of AI, simplifying data protection regardless of where, or what infrastructure that data resides on.
768K day - the day the Internet breaks (again)?
On August 12 2014, the Internet ‘broke’ as Verizon’s introduction of thousands more routes to the web meant the full capacity of the global, fourth version of the Internet Protocol (IPv4) routing table was reached.
One Identity: How to mitigate the risks of spearphishing
Targeting one company rather than casting a wide net allows threat actors to take a more sophisticated approach.
How to turbocharge your digital transformation project
"There are three key steps that should be taken to maximise the success of any planned digital transformation project."
10 factors MSPs need to consider when deploying an RMM tool
While RMM tools are typically easy to deploy, they’re replaceable too. The challenge for MSPs is that RMM solutions are never like-for-like, so it’s important to bring together the best combination of features.
The evolution of data centres to accommodate edge computing
Oft-cited applications, such as autonomous vehicles, with their massive sensor arrays and ultra-severe latency requirements, need their intelligence to be local.
Opinion: The journey to Networking 3.0
In the last several decades, we have seen massive changes to networking and networking technology.
Why transformation is a challenging time for any organisation
"As technology evolves, and business needs with them, the traditionally dominant consultancies face an existential crisis."