Magazine Button

Analysis

Barracuda Research finds one in five HTML email attachments found to be malicious

New research conducted by Barracuda Networks, a leading provider of cloud-first security solutions, has found that HTML attachments are by far the most used by cybercriminals for malicious purposes. The company’s analysis of millions of email attachments over the past month revealed that  one in five HTML attachments were malicious. By comparison, a meagre 0.03% […]


Australian enterprises are coalescing around service meshes to power their software engineering efforts

With the rise of distributed application architectures setting up key technical questions for developers and IT, Brad Drysdale, APAC Field Chief Technology Officer at Kong, examines how software is evolving. He tells us: “The future of software is distributed, microservices-driven and polycloud.” When you look at the technology operations of Australian enterprises, one does not […]


Addressing cybersecurity debt before it’s too late

Singapore-based Vincent Goh, Senior Vice President, APJ, CyberArk, highlights the importance of raising awareness of ‘cybersecurity debt’. He tells us about solutions to solve the digital identity debt dilemma and the ‘debt trap’.  How has the pandemic increased the number of opportunities for cybercriminals to attack? The pandemic has resulted in the acceleration of digitalization in many countries in the Asia […]


How Zero Trust can streamline the challenge of corporate M&A

Steve Singer, Regional Vice President and ANZ Country Manager, Zscaler, tells us completing the complex IT integrations required by mergers and acquisitions (M&A) processes is fraught with difficulties but many of these issues can be addressed by applying Zero Trust security principles. There has been a spate of corporate mergers and acquisitions (M&A) undertaken worldwide […]


How are data centre providers offering a solution to the widening skills gap?

Kao Data, the specialist developer and operator of high-performance data centres for enterprise, cloud, HPC and AI, has launched the Kao Academy – an industry-first science, technology, engineering and maths (STEM) resource, designed to engage primary and early secondary school-aged children with the purpose and role of a data centre. Created in collaboration with Cambridge […]


Introducing Cloudforce One: Cloudflare’s new threat operations and research team

Blake Darché, Head of Threat Intelligence at Cloudflare, introduces Cloudforce One, a new threat operations and research team from Cloudflare. Meet Cloudflare’s new threat operations and research team: Cloudforce One. While this team will publish research, that’s not its reason for being. Its primary objective: track and disrupt threat actors. The security teams we speak with […]


Navigating data sovereignty in a cloud-first, remote working era

Data dependent organizations cannot outsource responsibility for the confidentiality, integrity and availability of their critical data to a third-party cloud provider. So, Brian Grant, ANZ Director, Thales Cloud Security, asks once companies have made the jump into cloud, how do they land safely? In the wake of the global pandemic, companies across every sector moved […]


Governments train their digital gaze on high-performing systems

Digital Transformation touches an ever-growing number of Australian Government services. Hope Powers, Vice President – ANZ, Dynatrace, tells us it’s now time to focus on the observability of those services to improve their reliability and uptime. Most stories about Digital Transformation over the past two years have focused on the progress of private enterprise, where […]


How security and Business Continuity became inseparable

Aden Axen, Cloud Services Manager at Somerville, tells us the factors that used to trigger Business Continuity arrangements are no longer the biggest concern for Australian organizations. Business Continuity and business security used to be two distinct and siloed processes. However, the evolving threat landscape is a sign that organizations must change their mindset and […]


Containing and securing Shadow IT and technical debt

Joseph Carson, Chief Security Scientist, Delinea, outlines some typical examples of Shadow IT that organizations should watch out for to maintain their own security. To curb shadow IT effectively, you have to be aware of the environment in which it arises and why employees choose to use unmanaged apps and services. Here are some typical […]


1,100 IT pros spotlight the security hazards of hybrid work

Anthony James, VP of Product Marketing at Infoblox, provides an insight into Infoblox’s survey into the global state of security, including the impact of remote workers. Today’s cybersecurity challenges are not that much different than from past years, with one slight twist – the attack surface has dramatically shifted. The pandemic forced us to rethink […]


Uptime Institute report finds downtime costs and consequences worsening

Uptime Institute’s 2022 Outage Analysis has revealed that downtime costs and consequences are in fact worsening as industry efforts to curb outage frequency fall short. The research details latest digital infrastructure failure rates, increasing outage costs and impacts, top downtime causes and more. The digital infrastructure sector is struggling to achieve a measurable reduction in […]


Browse our latest issue

Intelligent CIO APAC

View Magazine Archive