Blogs

The failure of the antivirus industry

The failure of the antivirus industry

[Blog post] Insights from AVAR 2014.
Juha Saarinen Nov 26 2014 10:37AM Security
Getting tricked into playing social roulette

Getting tricked into playing social roulette

[Blog post] Defences against social engineering are failing.
Juha Saarinen Nov 12 2014 1:09PM Security
Stop the patches

Stop the patches

[Blog post] The situation has got out of hand.
Juha Saarinen Nov 5 2014 12:14PM Security
Go early, go hard, or go home

Go early, go hard, or go home

[Blog post] In defence of early adopters.
v f Nov 4 2014 2:50PM Strategy
It's time to rebrand IT

It's time to rebrand IT

[Blog post] Let’s make our name relevant before it make us irrelevant.
William Confalonieri Nov 3 2014 1:10PM Strategy
Australia needs to stop selling its innovation sector short

Australia needs to stop selling its innovation sector short

[Opinion] We need a global perspective.
David Havyatt Oct 31 2014 10:29AM Telco/ISP
Digital disruption and the future of work

Digital disruption and the future of work

[Blog post] Your company, your job, ready to be replaced.
William Confalonieri Oct 31 2014 10:20AM Strategy
A new age for the use of public data

A new age for the use of public data

[Blog post] Quest for efficiency trumps privacy concerns.
David Havyatt Oct 28 2014 11:38AM Telco/ISP
The CIO reborn

The CIO reborn

[Blog post] Emerging from a profound identity crisis.
William Confalonieri Oct 28 2014 11:20AM Strategy
CISOs' mojo lies in the metadata

CISOs' mojo lies in the metadata

[Blog post] Information surfaced has strategic advantage.
Steve Wilson Oct 28 2014 9:52AM Security
iiNet compromised by Dallas Buyers Club challenge

iiNet compromised by Dallas Buyers Club challenge

[Blog post] Protecting users is noble, but could iiNet fall victim to its past legal success?
Andrew Colley Oct 28 2014 6:36AM Telco/ISP
The Buyer’s Guide to Primary Storage

The Buyer’s Guide to Primary Storage

[Blog post] Choose the right storage for your workload.
Justin Warren Oct 27 2014 6:13AM Strategy
The CISO’s dilemma: Do you trust your partner’s partner?

The CISO’s dilemma: Do you trust your partner’s partner?

[Blog post] How far down the chain do you check?
Brett Winterford Oct 22 2014 1:10PM Software
How to cage a compute beast

How to cage a compute beast

[Blog post] Introducing Australia's high performance computing all-stars.
Brett Winterford Oct 17 2014 11:26AM Software
STEM skills need lifelong nurturing

STEM skills need lifelong nurturing

[Blog post] A problem too big for the political cycle.
David Havyatt Oct 15 2014 7:32AM Telco/ISP
Router rooting is shooting fish in a barrel

Router rooting is shooting fish in a barrel

[Blog post] Don't rely on broadband or wireless router vendors to protect you.
Juha Saarinen Oct 14 2014 3:05PM Security
The question every Aussie should ask at Dreamforce

The question every Aussie should ask at Dreamforce

[Blog post] Where is our data centre?
Brett Winterford Oct 10 2014 2:04PM Software
How to embed innovative thinking in the enterprise

How to embed innovative thinking in the enterprise

[Blog post] Ten practical tips.
Jeff Jacobs Oct 10 2014 12:14PM Strategy
Being a script kiddie easier than ever

Being a script kiddie easier than ever

[Blog post] Skills and effort barely required.
Juha Saarinen Oct 10 2014 12:14PM Security
Yes Minister, let's do the 'cloud-first' thing

Yes Minister, let's do the 'cloud-first' thing

[Blog post] We would have been happy with 'cloud is OK'.
Paris Cowan Oct 9 2014 12:00PM Strategy

Log In

  |  Forgot your password?