Best Practice stories
Execs flag fraud and cyber threats as financial sector's grim compliance demons, with a costly road ahead, reveals Accenture's study.
Tech Data announced that it has made further inroads in the APAC region - specifically India, Indonesia, Malaysia, Singapore, Thailand and Vietnam.
Operators that are looking build a strong IoT business are recommended to follow the example of the two telcos as best practice for building success.
Gemalto's Breach Level Index proves once again that data breaches across the world continue to increase in scale and severity.
Cloud outages hit enterprises hard, but well-planned disaster recovery strategies and interconnection-first approaches prevent chaos.
The big development project is almost ready to go live, inside the deadline. Just your security review to go. What happens next?.
From kitchens to kilobytes: Proper planning in redesigns crucial to dodge costly missteps, whether refitting homes or data centers.
Pega's workforce intelligence capabilities use robotic automation and AI to understand how sales and service agents work.
Only 16% think printers are at high risk of a breach, and 43% ignore printers in endpoint security entirely. HP New Zealand explains why.
Cybercriminals have been targeting Instagram users by luring them to install these apps, which claim to boost their Instagram followers.
Today's monitoring tools and products have absorbed so many enterprise use cases from data center, cloud and hybrid hosting environments.
Data protection vendor Datto is hoping to lure in new resellers and help current resellers expand their business with an updated MSP partner program.
Moodle is about to launch Project Inspire, which aims to collaboratively build learning analytics software that can fit into Moodle sites.
Smartphones aim to heighten convenience, but there is a real feeling that they're becoming a bigger target for cybercriminals. Why?.
Fuji Xerox New Zealand partners with Esker to automate manual business processes, improve cash flow performance.
At 31c0n, BT's Bryan K Fite emphasised the crucial unity of IT and OT for robust security, likening it to a “big barbecue” of collaboration.
There are two types of companies; Those that have been hacked, and those who don't know they have been hacked.
Data centre dialogue gets a hygge makeover, fostering joy in simplicity and strengthening customer relationships.
New Zealand escalates cyber defence with the launch of CERT NZ, a pinnacle move in safeguarding against digital threats.
Hear the Chairman of BICSI's International Standards Committee and Vice Chair of BICSI 002,which is a data center design and operations standard and b.