Opinion stories
With competition aplenty, it is important to understand what makes the cloud secure, what are the security risks and how it fits with transformation.
Secondary data has become elevated within the business as its value is uncovered across a number of key areas.
Taking a look at how speech analytics technologies can be used in the contact centre to improve customer service and B2C interactions.
We can no longer treat network security like a house onto which we keep tacking on additions and performing makeshift patch jobs.
Why financial institutions need to combat the increasingly complex and intelligent threat landscape with a holistic security approach.
Despite the optimism demonstrated by many CIOs, the actual process of cloud adoption among large organisations is slow.
SOTI explores how bringing disparate IoT projects together can drive value and how the channel can help to push that message.
A customer-facing organisation will receive hundreds, if not thousands of emails every day, each one containing personal identifiers.
Artificial intelligence (AI) remains highly in vogue as a technology topic across the media and within the IT supplier landscape.
Why design in a vacuum when you have an easily accessible and often willing source of information available to you?.
Addressing the requirements of an OT network is now more important than ever and requires an integrated approach.
While GDPR has been a hot topic of conversation recently, but what impact will the laws have on cloud platforms and environments?.
The more log data businesses amass, the greater opportunity they'll have to detect, diagnose and protect themselves from cyber-attacks.
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.
Before jumping on the IoT bandwagon, CIOs need to take a step back and carefully create a viable IoT strategy.
While a 300-bit quantum chip is theoretically feasible, it is not, at this time, practically possible, nor is it commercially viable.
As Australian companies race to adopt Robotic Process Automation (RPA), they must avoid six key mistakes to realise significant improvements in efficiency.
The rise of BYOD lets employees work from anywhere on personal devices but challenges IT to secure diverse endpoints, pushing for data-centric solutions.
Regardless of the size of the business, whether you do or don't have a handle on these common pitfalls, the market is a dynamic and shifting place.
Cloud-based sandboxing arises as the new defence against sophisticated malware, promising lower false-positives.