- 10 steps for a successful incident response plan
- The week in security: Breach costs down; Sydney leads follow-the-sun Security Day
- Australia asks Five-Eyes partners to ‘tackle encryption' with tech firms
- New social media scams: Can you tell friend from foe?
- As tech bridges cloud gaps, security is best managed outside the IT shop
A Brave New Security World
In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data. Virtual servers will mobilise computing power between network segments, data centers, and even outside of the corporate environment and into the public cloud, where computing power is offered as a utility.
- New business aims to help Aussie organisations rate digital maturity
- Google to stop scanning personal Gmail accounts for ad targeting
- What it takes to adapt to new audience expectations
- Uber for the truckies: How one Aussie startup is disrupting the freight industry
- CMO's top 8 martech stories for the week - 22 June 2017