Resources & Whitepapers

Listed below is a selection of technical whitepapers and other advisory notices produced by iTnews' sponsors.

These reports are available free of charge to our subscribers.

Filter by company:

7 guidelines to deliver tangible results quickly

7 guidelines to deliver tangible results quickly

Learn the top seven guidelines to consider when building customer focus - from understanding the data model to prioritising what to tackle first.
Jun 11 2021 3:24PM
Power your firm's intelligent digital workplace with digital document processes

Power your firm's intelligent digital workplace with digital document processes

Get on top of the digital document automation trends and issues in this report.
May 31 2021 5:36PM
Give your employees a positive UX

Give your employees a positive UX

Make the procurement, provision, use, support, updating and upgrading of your employee's devices a good experience.
May 14 2021 4:16PM
Customer Identity and Access Management for Dummies

Customer Identity and Access Management for Dummies

Secure, seamless digital experiences require modern Customer Identity and Access Management (CIAM). Learn the basics.
Apr 22 2021 12:02PM
Modernise Government Agencies with Oracle's next-generation cloud services

Modernise Government Agencies with Oracle's next-generation cloud services

Learn how to gain the advantages of public cloud while meeting data sovereignty, security and latency requirements in your own data centre.
Apr 21 2021 2:35PM
Empowering workforces in the new environment

Empowering workforces in the new environment

Inform your approach to empowering a distributed workforce in the wake of the pandemic.
Apr 19 2021 4:17PM
Is the technology refresh dead?

Is the technology refresh dead?

Learn about by continuous technology renewal in this guide from CHG-MERIDIAN.
Apr 9 2021 2:52PM
DevSecOps: A framework for digital innovation

DevSecOps: A framework for digital innovation

What proportion of Australian organisations are making headway with DevSecOps? This paper shines a light on uptake.
Mar 5 2021 5:35PM
Encryption: Protect your most critical data

Encryption: Protect your most critical data

Learn how encryption can help safeguard your data against threats and address compliance.
Mar 2 2021 8:11PM
Overcoming data security challenges in a hybrid, multicloud world

Overcoming data security challenges in a hybrid, multicloud world

This IBM paper covers key issues to consider when it comes to overcoming data security challenges in a hybrid, multicloud world.
Mar 2 2021 7:26PM
Move beyond passwords

Move beyond passwords

The case for passwordless authentication is compelling, but what are the common approaches organisations can take?
Mar 1 2021 11:03AM
The top 5 tech trends to deliver business outcomes

The top 5 tech trends to deliver business outcomes

IDC predicts that the foundation for using technology to deliver business value will shift from applications to platforms. This paper explains the implications for technology leaders.
Feb 16 2021 10:05AM
10 reasons why businesses need to invest in cloud security training

10 reasons why businesses need to invest in cloud security training

Show you have the technical skills and knowledge to manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures.
Feb 8 2021 2:03PM
Your guide to application security solutions

Your guide to application security solutions

Check if you are covering all bases by reading this Veracode guide to application security solutions.
Jan 29 2021 3:06PM
State of Software Security: Open Source Edition

State of Software Security: Open Source Edition

Understand your development teams' responsibilities in managing open source security risks.
Jan 29 2021 2:59PM
Five questions to ask before you upgrade to a SIEM solution

Five questions to ask before you upgrade to a SIEM solution

How well are you detecting attacks? Learn about key questions to ask before choosing a SIEM, in this IBM eBook.
Jan 21 2021 10:53AM
Effectively addressing advanced threats

Effectively addressing advanced threats

Learn how large, mature organisations are dealing with advanced cyber security threats, in this report by SANS, which was commissioned by IBM.
Jan 21 2021 12:52AM
The risky business of open source

The risky business of open source

Learn about the results of analysis of 351,000 external libraries found in 85,000 applications.
Jan 13 2021 5:55PM
Ensure your e-signatures are legally binding

Ensure your e-signatures are legally binding

Australian e-signature rules have changed. Download this quick Adobe guide to key rules and dates in different states and territories.
Jan 12 2021 6:39PM
Mitigating open source risk in your organisation

Mitigating open source risk in your organisation

Build a framework for prioritising open source application security.
Jan 12 2021 5:46PM

Log In

  |  Forgot your password?