Latest Articles

Why legacy systems have become cybersecurity's least trusted zone

Legacy systems are often portrayed as technical problems. However, in practice, they are a serious governance concern.

Security 25 March, 2026

How sovereign AI is transforming the cloud landscape

Sovereign AI aims to secure data, and provide operational and technical control over AI infrastructure and models within national borders.

Cloud + virtualisation 23 March, 2026

How Australia can play a leading role in the AI revolution

Is Australia ready for the AI infrastructure crunch?

Data centres 18 March, 2026

Most SMBs are using AI but data loss remains a persistent risk

Layered backup architectures that span local, removable and offsite storage form the foundation for dependable data protection at scale.

Storage 17 March, 2026

In-vehicle WWAN solutions: redefining connectivity for utilities operations

How Ericsson in-vehicle WWAN solutions and Intelligent Link Bonding are redefining connectivity for utilities operations.

Networking 12 March, 2026

Featured Products
Featured Products
IT Management
How to effectively manage shadow AI usage without slowing innovation

How to effectively manage shadow AI usage without slowing innovation

Should organisations restrict the use of shadow AI or permit broader experimentation while absorbing the heightened exposure?

Article 10 March, 2026
Security
Why legacy systems have become cybersecurity's least trusted zone

Why legacy systems have become cybersecurity's least trusted zone

Legacy systems are often portrayed as technical problems. However, in practice, they are a serious governance concern.

Article 25 March, 2026
Data Centres
How Australia can play a leading role in the AI revolution

How Australia can play a leading role in the AI revolution

Is Australia ready for the AI infrastructure crunch?

Article 18 March, 2026
  • All content Copyright © 2026 Westwick-Farrow Pty Ltd