CFOtech Australia - Technology news for CFOs & financial decision-makers

Opinion stories - Page 266

Thinkstockphotos 510691579

Around 17 million websites are already powered by WordPress - are they secure?

Thu, 20th Apr 2017
#
mfa
#
iam
#
cybersecurity
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Thinkstockphotos 660650894

Why a VPN is essential in Australia after the Metadata Retention Law

Thu, 20th Apr 2017
#
data protection
#
vpns
#
australian government
As Australia enforces metadata retention, VPNs become crucial to safeguard privacy from government surveillance, making Get a VPN Day more relevant than ever.
Thinkstockphotos 502284438

Why a digitalisation strategy is keeping CIOs up at night

Thu, 20th Apr 2017
#
digitisation
#
software ag
#
opinion
This strategy needs to be a constantly evolving plan that can be changed, modified or replaced at a moment's notice.
Thinkstockphotos 482254895

Three things companies must know about data sovereignty when moving to cloud

Wed, 19th Apr 2017
#
microsoft
#
cloud services
#
servicenow
Move out of that 1980s technology stack and into the world of the cloud – you can get there with knowledge and a trusted vendor.
Thinkstockphotos 491429160

How businesses should prepare for Australia's new mandatory data breach notification laws

Wed, 19th Apr 2017
#
firewalls
#
network infrastructure
#
hyperscale
Australia, like other countries, has not been immune to data breaches in which personal information has been exposed.
Thinkstockphotos 488253356

Zero day distributing FINSPY espionage malware and LATENTBOT malware

Tue, 18th Apr 2017
#
malware
#
breach prevention
#
cybersecurity
FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to download and execute a Visual Basic script.
Thinkstockphotos 187890557

Don't buy the elixir of youth: Machine learning is not magic

Tue, 18th Apr 2017
#
malware
#
ai
#
cybersecurity
If someone told you they had a magic elixir that would heal all your illnesses or injuries, and make you young again, would you believe them?.
Thinkstockphotos 489433130

When imitation is not the sincerest form of flattery

Thu, 13th Apr 2017
#
phishing
#
email security
#
cybersecurity
Early detection and effective intelligence is critical in today's digital world to mitigate the risks created by today's connected world.
Thinkstockphotos 534455202

How to avoid that next storage hardware refresh

Tue, 11th Apr 2017
#
storage
#
virtualisation
#
converged infrastructure
Customers tell me repeatedly that they dread the phone call from their hardware storage vendor. Every three or four years, the call is predictable.
Thinkstockphotos 469918032

Strategy for cyber crime: own the routers, own the Internet

Mon, 10th Apr 2017
#
router
#
carbon black
#
opinion
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.
Thinkstockphotos 478338933

It's time to finally say goodbye to Windows XP. And Vista. Again.

Mon, 10th Apr 2017
#
malware
#
cybersecurity
#
microsoft
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.
Thinkstockphotos sb10069456i 001

Complexities & challenges with ever-changing data center landscape

Wed, 5th Apr 2017
#
hyperscale
#
dc
#
colocation
IT, data center and networking professionals are regularly faced with complexities and challenges as business and customer requirements change.
Thinkstockphotos 655596958

Don't pay for what is for free: Malicious Adobe Flash Player app found on Google Play

Wed, 5th Apr 2017
#
malware
#
martech
#
cybersecurity
F11 did not contain any harmful code. Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.
Thinkstockphotos 613552492

Diversity & inclusion has to be woven into business DNA

Mon, 3rd Apr 2017
#
hcm
#
dna
#
payroll systems
The point is to establish data-driven decision making on a daily basis for hiring, promotion, development, rewards and teamwork.
Thinkstockphotos 101359429

Malware campaign targets open source developers on GitHub

Fri, 31st Mar 2017
#
malware
#
martech
#
apm
Be on your guard if you're a developer who uses GitHub – someone could be trying to infect your computer with malware.
Thinkstockphotos 623372694

Internet of things: From smart idea to smart reality - but is your network IoT ready?

Wed, 29th Mar 2017
#
iot
#
healthtech
#
m2m
The hype surrounding the potential of IoT shows no sign of subsiding, and now – IoT is morphing from a smart concept to reality.
Thinkstockphotos 617382644

How low-code platforms enable digital transformation in ANZ banks

Wed, 29th Mar 2017
#
uc
#
digital transformation
#
fintech
Technology savvy customers across ANZ are demanding for technologies such as mobile commerce and the use of smartphones for banking transactions.
Future business productivity

Talend: Subscription business models driving continuous innovation

Wed, 29th Mar 2017
#
saas
#
digital transformation
#
subscriptions
As business models rotate toward subscription services, if technical developments don't keep pace, a crucial piece of the puzzle will be missing.
Thinkstockphotos 474486151

Australia highlights region's commitment to cyber security

Mon, 27th Mar 2017
#
carbon black
#
opinion
#
partners
It's easy to get bogged down in the weeds and become polarised on the multitude of dangerous threats to our cyber identities and our businesses.
Thinkstockphotos 486791090

The economics of cybersecurity for the undecided

Mon, 27th Mar 2017
#
malware
#
ddos
#
phishing
It is precisely because of this concept of the cost of doing nothing that we're able to determine the value of a cybersecurity solution.