Articles
AI in physical security
Knowing where AI fits and how it can and should be leveraged means we need to examine its potential use cases, risks and shared responsibility. [ + ]
Threat spotlight: Attackers use inbox rules to evade detection
A new report from Barracuda Networks shows how attackers work by forwarding sensitive emails, hiding security alerts and monitoring victim activities. [ + ]
Cutting costs of digital downtime with observability
In today's rapidly evolving tech landscape, observability is an indispensable tool for understanding and managing complex environments. [ + ]
Rising pressure to manage third-party cybersecurity risks
APRA has put the spotlight on the need for financial institutions to better manage the risk of cyber attacks via third parties. [ + ]
The positives of PaaS on private cloud
As lessons are learned about operating in public clouds, other 'flavours' of cloud are emerging as superior options. [ + ]
Young workers demand better technology
New research reveals that the retirement of baby boomers and rise of 'digital natives' will heighten employee expectations around workplace tech. [ + ]
Microsoft M365 Copilot trials announced
Microsoft has announced the first Australian customers to access M365 Copilot as part of the invitation-only global Early Access Program. [ + ]
Every second counts: how data can help combat cybercrime
As the threat attack surface widens and lines between breaches, fraud and financial crimes fade, using siloed approaches and incomplete data is now untenable. [ + ]
Accused of cheating in the age of ChatGPT
A recent study by Drexel University has examined the reactions of students who have been accused of using ChatGPT to cheat. [ + ]
SA Rugby using advanced analytics to improve performance
As world champions, the Springboks use every opportunity to improve performance. To gain that extra 1%, SA Rugby engaged Dell Technologies. [ + ]
Why AI and unorganised data can't be friends
Just like you shouldn't run a marathon without training, implementing AI on top of unorganised data is not going to get you the results you want. [ + ]
The power to revolutionise retail
As technology continues to reshape industries, GenAI is emerging with a mission to redefine the Australian retail landscape. [ + ]
Navigating remote working cyber risk
The more complex and decentralised a company's IT structure becomes, the more vulnerabilities that serve as attractive gateways for cybercriminals. [ + ]
Building First Nations' digital capability
Census data shows only 1402 Indigenous ICT workers in Australia, but efforts are underway to create a pipeline of Indigenous Australian tech talent. [ + ]
Redefining IT sustainability
Reaching carbon neutral is a significant milestone, but it's more than carbon offsetting. It means rethinking every aspect of business operations. [ + ]