Modern Listing Example
Strategic pillars of change: Analysis of the cyber security strategy
On the 21st April, the Federal Government’s long-awaited Cyber Security Strategy was launched from Sydney’s…
Trade body urges action in light of China counterfeit report
The hologram trade body wants organisations to urgently review and redouble security plans to try…
Global Connection Speeds and Broadband Adoption Trending Upward According to Akamai ‘First Quarter, 2016 State of the Internet Report
Global average Internet connection speed increases 23% year over year Akamai Technologies has released its First…
VMware Calls for a Comprehensive IT Security Architecture that Aligns People, Priorities and Products against Today’s Evolving and Increasingly Frequent Cyber-Attacks
Businesses must adopt a holistic approach to security that cuts across all levels of compute,…
How cloud infrastructure is making enterprise IT more secure
While organisations have long been aware of cloud’s ability to reduce costs and increase agility,…
Axis introduces the industry’s first IP cameras with i-CS lens
The intelligent i-CS lens featured in the new AXIS Q1615 Mk II and AXIS Q1615-E…
Digital Identity
How the DTO will improve access to online government services for millions of Australians The…
ISACA Installs 2016-2017 Board of Directors
Christos Dimitriadis of INTRALOT to Serve a Second Term as Chair ISACA has announced its 2016-2017…