Navigating tech catastrophes: five key lessons from the CrowdStrike outage
As organisations continue to recover from the CrowdStrike incident, it is essential to reflect on the key lessons learned to mitigate the effects of future disruptions.
What is the cost of a false alarm when it comes to data issues?
A documented triage process is necessary in order to weed out any misunderstandings and false alarms about data issues.
Taming cloud costs and carbon footprint with a FinOps mindset
In today's business environment, where cloud is at the centre of many organisations' IT stack, the costs associated with the technology can get out of control.
Balancing innovation with integrity to build trust in AI
Given the promising reports on AI one might assume its widespread adoption is inevitable, however, many share a more cautious perspective.
How can Australia become an AI leader?
Australia is currently an AI innovator, scoring highly on AI maturity in a recent IDC study.
Peltier Thermoelectric series precision coolers
The Peltier Thermoelectric series of precision coolers are designed to keep enclosed electronics...
ATEN VP3520 Matrix Switch with Control
The ATEN VP3520 is designed to control AV devices such as displays and projectors, with an audio...
Navigating tech catastrophes: five key lessons from the CrowdStrike outage
As organisations continue to recover from the CrowdStrike incident, it is essential to reflect on the key lessons learned to mitigate the effects...
-
Tenable launches AI Aware security solution
Tenable says its AI Aware solution enables organisations to get a complete picture of the AI...
-
-
Dell and Red Hat forge AI collaboration
The Red Hat Enterprise Linux AI foundation model platform has been validated for use on on Dell...
-
-
Interactive to add NetApp tech to its portfolio
Interactive has arranged to offer solutions from NetApp to augment its Interactive Anywhere IT...
-
The MediSecure breach thrusts the security spotlight back on service providers
Organisations have been confronting security risks in their supply chains for years, but a new wave of attacks is encouraging threat actors to...
-
Managing third-party cybersecurity risks in the supply chain
Third-party cybersecurity breaches occur when the victim's defences are compromised through a...
-
-
Countering MFA fatigue demands a rethink on user authentication
While MFA remains effective, highly motivated threat actors are using tactics that seek to...
-
-
Four common zero-trust misconceptions derailing cybersecurity success
John Kindervag, creator of the zero-trust concept, explores the four most common zero-trust...
-
How can Australia become an AI leader?
Australia is currently an AI innovator, scoring highly on AI maturity in a recent IDC study.
-
NextDC opens $80m Darwin data centre
NextDC's new D1 data centre in Darwin is designed to help the Northern Territory capitalise...
-
-
OVHcloud opens water-cooled DC in Sydney
OVHcloud's third data centre in Sydney uses technology that can cool a server with the...
-
-
Vertiv launches AI-powered micro data centre
Vertiv's new SmartAisle 3 modular micro data centre platform uses the power of AI to maximise...
-