Australia's leading source of security and threat news
These search results are from across the Techday network of sites
How to manage cultural change while adopting DevOps
Cultural change is the number one barrier to DevOps success. Here are 10 tips from ServiceNow on how to tackle this issue.
Tackling the finance sector’s biggest challenge: trust and performance
As customers flock to digital channels to manage their money, the pressure is on for financial institutions to offer a seamless experience.
Focus your organisational goals on XaaS and build a better business
Unit4 take a look at how businesses can capitalise and effectively engage consumers in an Everything as a Service (XaaS) economy.
Your developers belong in the cloud. Here’s how to get them there
Looking towards the future, the next-generation of businesses are going to be able to utilise the cloud in ways that we cannot comprehend.
Key considerations for effective cloud migration
If migration is not managed correctly, organisations can experience a major disruption resulting in lost revenue.
How to turn big data into valuable business information
To take advantage of the big data wave, organisations must find effective ways to assess, store and analyse large amounts of data.
Service providers take note: an insight into the future of work
The $3 trillion services market hovers on the cusp of disruption as organisations worldwide begin to transform the way they work forever.
The weaponisation of AI: how to defend against machine generated cyber attacks
The ‘weaponisation’ of AI was predicted to be one of the biggest cybersecurity threats of 2018. Here's how to prepare.
How offering IT ‘self-service’ can help create a more attractive workplace
How technology is offered in the workplace can have an instrumental impact on how an organisation is perceived and whether people will want to stay.
Storage is the secret weapon that protects unstructured data
Unstructured data is exploding and it may pose a risk to organisations that they may not have thought about.
Welcome to the cyber-regulatory market of 2018 and beyond
The cyber-regulatory environment is growing exponentially, to the point where we are seeing the maturity of a brand new market.
Making an impact with data: top tips for CDOs
Data should not be viewed as an asset in-and-of-itself, but a raw material that can be leveraged.
Why let data centre maintenance keep you up at night?
It has never been more important to ensure 'always-on' data centre uptime, but traditional tools will do nothing but give you headaches.
Bridging the digital skills gap in the AEC industry
With the construction industry projected to grow by more than 120,000 jobs in the next five years, having a workforce of skilled employees is a must.
How a WAN can enable commercial strategy execution
When assessing capabilities to execute commercial strategy, including the capacity to scale the operation and resources, consider the WAN.
GDPR: Australia is at the tip of the security iceberg. It’s time to sink or swim
What does GDPR mean for Australian organisations? Splunk outlines key points.
Taking a look at the growing trend of text analytics
Using text analytics, engineers can extract more value from raw text and combine it with sensor data and ML to improve a range of functions.
Achieving agility: data portability in the digital economy
Why Data portability is important for the enterprise space, and how you can go about achieving it.
Why your organisation now needs to worry about IPv6 attacks
Evidence suggests that IPv6 attacks are escalating, here's how to protect your organisation.
Profiting from IoT: How to effectively monetise software
Flexera outlines three crucial sales techniques for IoT software offerings that facilitate recurring revenues.
A look at how DataOps can drive significant business value
DataOps is emerging as a significant new trend that will serve to increase collaboration, agility and operational efficiency for large organisations.
Stuck in the middle: how ‘grey websites’ highlight the importance of DNS decision-making
With the explosion of cyber-security attacks, what is the best way of determining which websites are good and which are bad?
Assessing the rising threat of encrypted tunnels
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.