5 ways businesses can avoid IT purchasing regrets
When asked about technology purchase regrets, veteran tech exec Sanjay Macwan digs deep for a classic hyped technology that has yet to pan out: smart glasses.
When asked about technology purchase regrets, veteran tech exec Sanjay Macwan digs deep for a classic hyped technology that has yet to pan out: smart glasses.
Getting ready for one of the most demanding review processes in cybersecurity can be daunting, but experts say preparing for a SOC 2 audit can be an important part of a well-managed year-round security program.
More CISOs are balancing their response and recovery capabilities with proactive measures that anticipate attacks and vulnerabilities.
Old perimeter-based defences can throw up roadblocks to implementing a zero trust strategy, but a measured, phased approach will see you through.
Forward-thinking CIOs are mapping out three-year plans that anticipate newly mainstreamed tech, blended teams and democratised IT.
Security and privacy teams working with sales, marketing and design ensures a good user experience while protecting data and maintaining regulatory compliance.
IT leaders are not immune to infatuation with the promise of emerging tech. Here, CIOs share which technologies they believe are primed to underdeliver.
Stephanie Benoit Kurtz thought she had a good deal when, in one of her former CISO roles, she signed a three-year contract with a vendor for vulnerability management.
Farshchi joined the credit reporting agency in 2018 with a mandate for change following the company’s high-profile data breach.
Security and efficiency directives are fueling a shift in IT spending toward foundational business requirements to position organisations for uncertain future.
HP CIO Ron Guerrier is working to diversify IT’s suppliers and boost the benefits they get from working with HP to build a more representative technology workforce.
As security budgets continue to rise, where is the money going? Recent surveys offer insight into CISO spending for the year ahead.
Allison Miller joined the social media company in February 2021, assuming a range of responsibilities, from security and privacy to trust and safety.
Don’t let these easy-to-overlook mistakes trip up a security strategy.
Mitigating third-party risk, baking security into the development process and defending against ransomware attacks are just a few things that are top-of-mind for CISOs today.
EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.
ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.