Kiwi software company aims to improve global customer experiencePlexure has developed an intelligent technology platform that powers mobile marketing.
Nuix eyes legal sector as eDiscovery demand skyrockets
eDiscovery must encompass so much more than email and documents. If you haven’t looked at text messages and online chats, digital images, mobile devices, data in the cloud and social media, you’re not getting the whole story.
New ACS report reveals challenges ahead for blockchain
“Blockchain has some way to go before it becomes a mainstream technology."
What the future of fibre looks like in NZ
The Commerce Commission has released its emerging views paper on the rules, requirements and processes which will underpin the new regulatory regime for New Zealand’s fibre networks.
Gen Z confidence in the economy is on the decline
Businesses need to work hard to improve their reputations.
Why NZ businesses have less than two years to adopt digital before disruption hits
Research found that digital disruption is already impacting two-thirds of New Zealand organisations.
Dell EMC launches interactive AI Experience Zones
The AI Experience Zones are designed to educate visitors about how to start, identify, and implement an AI project.
What NZ can learn from the Baltimore cyberattack
“Businesses must control physical access to their computers and secure their networks."
Infratil seeks clearance to acquire up to 50% stake in Vodafone NZ
The commission will give clearance to a proposed merger if they are satisfied that the merger is unlikely to have the effect of substantially lessening competition in a market.
Hands-on review: MiniTool Power Data Recovery Software
I came across a wee gem of advice when researching the world of data recovery. As soon as you get that sinking feeling and realise you’ve lost a file, stop using your computer.
Deepfakes the 'next wave of concern' - but can law really stomp it out?
Enforcing the existing law will be difficult enough, and it is not clear that any new law would be able to do better. Overseas attempts to draft law for deepfakes have been seriously criticised.
Acquia delivers open source framework for contextual commerce
The framework connects the Drupal open source web content management system with e-commerce platforms from Acquia partners.
Are you all set to ride the new wave of technology disruption?
Why IT professionals are not immune to digital disruption.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Five ways Windows 10 Professional lets you have it all
It’s the definition of a modern desktop that gives you the most productive and secure computing experience.
How UBanks, Seek and Carsales.com are harnessing the potential of AI
In this report, we take a look at three use cases – from employment marketplace, SEEK, from classifieds business Carsales.com and from online bank UBank – to explore how they’ve integrated AI, and what ROI they’ve seen since developing these capabilities.Click Here
Digital transformation is driving a new war for executive talent
Organisations are realising that digital transformation is largely a talent issue.
How Zinier aims to bring automation to the field service industry
“ISAC's AI and automation capabilities will help us manage infrastructure and work more proactively."
Whitepaper: Gartner’s top picks for enterprise archiving services
The Magic Quadrant on Enterprise Information Archiving evaluates vendors on compliance, preservation, and discovery use cases.Download
Schneider shares advice for solving edge computing challenges
Schneider Electric has shared the findings of a new whitepaper that delves into the issues of deploying IT at the edge.
Why third-party solutions are key to realising the benefits of Office 365
Research shows ongoing security concerns about email security in Office 365.Download
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
Whitepaper: Filling your cloud technical skills gap
The study surveys more than 950 IT decision makers and 950 IT pros from across the globe to better understand the barriers to increasing cloud usage.Download
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.Download
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
How digitisation delivers speed to Porsche service documents
With its Service Department drowning in paperwork, Giltrap Porsche looked to Fuji Xerox New Zealand and its DocuShare Flex cloud document management solution for digital answers.
Atos develops edge server with security in mind
The BullSequana Edge server is able to securely manage and process IoT data close to the source of data generation so that it is treated immediately.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Flying high: How airline Scoot enhances the customer experience
Singapore Airlines’ low-cost arm Scoot has selected Dell Boomi’s platform help it better understand its customers – and its own business.
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
MSSPs for dummies - all you need to know about multicloud security
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. A lot is at stake and yes, you should be cautious.Download
How HR leaders can capitalise on their moment in the spotlight
“Segmenting employees empowers leaders with various channels to effectively engage with the entire workforce."
Chorus partners with Nlyte, expands edge data centre offerings
Chorus announced today that it is going ahead with expanding its Chorus EdgeCentre Colocation product to three sites across New Zealand.
Whitepaper: Evaluating VMware Cloud on AWS
VMware Cloud on AWS allows access to the range of AWS services as an extension of an existing VMware solution.Download
Preventing business email compromise starts on the inside
90% of global organisations have seen phishing attack volumes increase and 40% have seen the volume of impersonation attacks increase.Download
How to train staff on security 101
Trained employees are less likely to conduct damaging activities like clicking that dodgy link in an email, or overshare on social media.Download
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
Y Soft and Brother partner to enhance print management
YSoft SafeQ integrated print management and document capture solution is now embedded in Brother multifunction devices.
Interview: Understanding the difference between analytics and AI
"Artificial intelligence is defined as a computer making choices a human would normally make, however, that could mean a lot of things."
Agility or risk? The security pain points causing tension in business
There’s tension in the workplace for businesses – and it’s all to do with the tradeoff between flexible working and cybersecurity.
Whitepaper: Neutralise your biggest security risk - your employees
Internal threats caused by careless employees increased by 37% last year, a study has found.Download
How organisations should prepare for cloud migration
How ready are Australian organisations for cloud migration?Download
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
CIOs in A/NZ are slowly making digital business progress
“A/NZ CIOs have the chance to step up to become more influential business leaders, but most are not seizing that opportunity to drive change.”
AI Chipmaker Hailo releases new deep learning processor
"We are excited to help customers drive their intelligent devices to new limits."
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
The Data Literacy Project and Qlik launch new certification for data literacy
“The potential for data-informed decision making across all roles and business functions is massive."
Porirua City Council adopts Datacom’s new software solution
Porirua City Council is the first New Zealand council to go live with Datacom’s smart council and community cloud-based solution.
Adobe & Software AG transform customer experience management
Adobe and Software AG have announced a partnership that will help businesses transform their customer experience management.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
Integrating data into decision-making from the ground up
In order to implement a change that can be sustained, organisations need to find a way to embed it into their culture.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
How to embed flexibility and agility in big data architecture
Big data analytics strategies need flexibility and agility to meet changing business demands.Read More
Chch crypto exchange Cryptopia facing liquidation
It seems that Christchurch-based cryptocurrency exchange Cryptopia has been unable to recover after malicious cyber attackers stole around $20 million worth of cryptocurrency.
InPhySec forges partnership to tackle NZ cybersecurity market
The Kiwi managed security services provider is partnering with CrowdStrike to bring its endpoint protection solution to its customers.
Whitepaper: What will losing your data cost you?
Do you know how much your data is worth, more importantly, what it will cost if it is lost?Download
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
AI's lack of intuition is where humans excel best
Could you trust machines to make business decisions with the right amount of judgement and contextual understand that humans can? Not yet.
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
F5 acquisition of NGINX now complete
The companies have released blogs on the topic, explaining how NGINX will now operate as a unit of F5, and the benefits they expect this merger to bring.
Four NZ projects shortlisted in IDC's APAC Smart Cities Awards
The annual awards highlight and acknowledge outstanding smart city initiatives in the Asia Pacific region and this year attracted over 180 entries.
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.Download
Fujitsu and Veeam partner to offer simplified backup and recovery
This new partnership promises the increased availability of data and faster recovery from disasters and unplanned system downtime.
NZ businesses are leaving themselves vulnerable to cyber threats
Barely six per cent of business and companies in New Zealand have adequate cyber protection.
Yes, data is the new oil - but only analytics can refine the insights
Data has frequently been referred to as the ‘oil’ of the 21st century - much like oil, it’s a raw material that can be transformed into insights and value. Following that analogy, the oil refineries of data today are business intelligence and analytics platforms.
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."Download
Diversification strategy pays off for Parallo
Parallo has been formally recognised after receiving four new major competencies from its core partners, VMware and Microsoft.
Windows 10 Professional lets you have it all
Security, intuitive search, tips, and distraction-free focus time - Windows 10 Professional has matured to provide everything you could dream of in an OS for your business.More Info
Your company is collecting more data – but how do you make it work for you?
Terabytes are old news – data is growing at the rate of petabytes, zettabytes, and beyond.Click Here
New Zealand Govt announces cloud framework agreement with SAP
“Data-driven solutions are the most powerful way to solve some of society’s most pressing problems."
The emotional side of cybersecurity
To train or not to train: This is the emotional side of cybersecurityDownload
HPE to acquire supercomputing leader Cray
“Cray is a global technology leader in supercomputing and shares our deep commitment to innovation."
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
Epson FF-680W: The world's fastest WiFi photo scanner
“There was clearly a need for an ultra-fast and easy scanning solution that enabled people to digitise hard copy photos often stored in albums or boxes.”Download
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Why businesses are failing at cybersecurity
Email is the number-one vector used to initiate attacks like malware delivery, impersonations and phishing attacks.Download
Virtustream launches new services for cloud applications
The new suite of professional and managed services expands Virtustream’s enterprise application and services solutions.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
You only get one chance to make a first impression
Regardless of where you come from one thing is for certain, businesses only get one chance to make a first impression.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
Aerohive enables you to manage your network with Alexa
A voice-driven interface to access the network can significantly increase efficiency for IT networking professionals.Click Here
Trustpower selects Hawaiki as key connectivity partner
This deal is the latest in a series of commercial wins for Hawaiki.
10 best practices for building effective dashboards
When you've created an effective dashboard, you will wonder how you ever lived without it. Here are 10 ways to build the perfect dashboard.Read More
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
Involve the players, enjoy the game: Cyber resilience the right way
The most common threats are email-borne, so it makes sense to tackle that one.Download
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
Vocus slams ComCom mobile review as “disgraceful”
The Commission says there is no need for measures to improve competition in the NZ mobile market. Vocus says this decision will be “crippling.”
Sony and Microsoft to explore strategic partnership
“Our partnership brings the power of Azure and Azure AI to Sony."