Are AI assistants teaching girls to be servants?Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Commission warns Spark for misleading in-contract customers
The warning follows an investigation into representations Spark made on its website and in emails in August and September 2018.
Optic Security Group celebrates Axis accolade
Auckland-based business security systems provider Fortlock has picked up an award at Axis Communications’ annual Oceania Axis Partner Summit 2019.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Informatics deepens integration with Google Cloud
The data management company has connected its solutions with Google Cloud’s big data analytics solutions.
Apple brings 8-core processors to MacBook Pro
The addition of 8th- and 9th-generation Intel Core processors will deliver 40% more performance than a 6-core Pro.
Nutanix evolves multicloud offerings
Nutanix has expanded its multicloud solutions portfolio to further evolve its offerings across public and private cloud.
The impact of bringing biometrics to the door
"Despite the benefits of biometrics, there have been impediments to its broader enterprise adoption."
How SUSE plans to help customers innovate, compete and grow
“SUSE is powering digital transformation with agile open source solutions like SUSE Enterprise Storage."
Why the retail industry has misplaced network priorities
“For retail organisations unplanned network outages can impact both revenue and reputation significantly."
How open source distribution accelerates Drupal development time by 30%
Acquia Lightning has adopted Drupal’s support for JSON:API, delivering out-of-the-box support for building decoupled or headless applications.
Qualtrics aims to help organisations master experience management
Experience Basecamp helps users master XM products, including CustomerXM, EmployeeXM and Research Core.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.
Aerohive enables you to manage your network with Alexa
A voice-driven interface to access the network can significantly increase efficiency for IT networking professionals.Click Here
MSSPs for dummies - all you need to know about multicloud security
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. A lot is at stake and yes, you should be cautious.Download
How digitisation delivers speed to Porsche service documents
With its Service Department drowning in paperwork, Giltrap Porsche looked to Fuji Xerox New Zealand and its DocuShare Flex cloud document management solution for digital answers.
The emotional side of cybersecurity
To train or not to train: This is the emotional side of cybersecurityDownload
Sony and Microsoft to explore strategic partnership
“Our partnership brings the power of Azure and Azure AI to Sony."
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
What the future of fibre looks like in NZ
The Commerce Commission has released its emerging views paper on the rules, requirements and processes which will underpin the new regulatory regime for New Zealand’s fibre networks.
DDN completes Nexenta acquisition
DDN holds a suite of products, solutions, and services that aim to enable AI and multi-cloud.
What NZ can learn from the Baltimore cyberattack
“Businesses must control physical access to their computers and secure their networks."
HPE to acquire supercomputing leader Cray
“Cray is a global technology leader in supercomputing and shares our deep commitment to innovation."
Infratil seeks clearance to acquire up to 50% stake in Vodafone NZ
The commission will give clearance to a proposed merger if they are satisfied that the merger is unlikely to have the effect of substantially lessening competition in a market.
Huawei and IBM rank top in new cloud market analysis
360Quadrants has released a managed services report that also names Atos and Accenture as leaders in its new managed services report.
New ACS report reveals challenges ahead for blockchain
“Blockchain has some way to go before it becomes a mainstream technology."
Kiwi software company aims to improve global customer experience
Plexure has developed an intelligent technology platform that powers mobile marketing.
Flying high: How airline Scoot enhances the customer experience
Singapore Airlines’ low-cost arm Scoot has selected Dell Boomi’s platform help it better understand its customers – and its own business.
Deepfakes the 'next wave of concern' - but can law really stomp it out?
Enforcing the existing law will be difficult enough, and it is not clear that any new law would be able to do better. Overseas attempts to draft law for deepfakes have been seriously criticised.
Whitepaper: Neutralise your biggest security risk - your employees
Internal threats caused by careless employees increased by 37% last year, a study has found.Download
Acquia delivers open source framework for contextual commerce
The framework connects the Drupal open source web content management system with e-commerce platforms from Acquia partners.
Vocus slams ComCom mobile review as “disgraceful”
The Commission says there is no need for measures to improve competition in the NZ mobile market. Vocus says this decision will be “crippling.”
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
How organisations should prepare for cloud migration
How ready are Australian organisations for cloud migration?Download
Whitepaper: Filling your cloud technical skills gap
The study surveys more than 950 IT decision makers and 950 IT pros from across the globe to better understand the barriers to increasing cloud usage.Download
Agility or risk? The security pain points causing tension in business
There’s tension in the workplace for businesses – and it’s all to do with the tradeoff between flexible working and cybersecurity.
Windows 10 Professional lets you have it all
Security, intuitive search, tips, and distraction-free focus time - Windows 10 Professional has matured to provide everything you could dream of in an OS for your business.More Info
Why losing customer data will cost you
Do you know how much your data is worth, more importantly, what it will cost if it is lost?Download
Virtustream launches new services for cloud applications
The new suite of professional and managed services expands Virtustream’s enterprise application and services solutions.
Whitepaper: Modern information management is a necessity, not a choice
Organisations are facing major challenges that makes information management more challenging than ever before.Download
Whitepaper: Using AI to revolutionise healthcare
Whitepaper: Making AI work for the healthcare sectorDownload
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Dell EMC launches interactive AI Experience Zones
The AI Experience Zones are designed to educate visitors about how to start, identify, and implement an AI project.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
DNS security is easier than you think
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Adobe & Software AG transform customer experience management
Adobe and Software AG have announced a partnership that will help businesses transform their customer experience management.
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.Download
Gen Z confidence in the economy is on the decline
Businesses need to work hard to improve their reputations.
Whitepaper: Gartner’s top picks for enterprise archiving services
The Magic Quadrant on Enterprise Information Archiving evaluates vendors on compliance, preservation, and discovery use cases.Download
Hands-on review: MiniTool Power Data Recovery Software
I came across a wee gem of advice when researching the world of data recovery. As soon as you get that sinking feeling and realise you’ve lost a file, stop using your computer.
Are you all set to ride the new wave of technology disruption?
Why IT professionals are not immune to digital disruption.
How UBanks, Seek and Carsales.com are harnessing the potential of AI
In this report, we take a look at three use cases – from employment marketplace, SEEK, from classifieds business Carsales.com and from online bank UBank – to explore how they’ve integrated AI, and what ROI they’ve seen since developing these capabilities.Click Here
New Zealand Govt announces cloud framework agreement with SAP
“Data-driven solutions are the most powerful way to solve some of society’s most pressing problems."
Veeam Availability Orchestrator update aims to democratise DR
The ability to automatically test, document and reliably recover entire sites, as well as individual workloads from backups in a completely orchestrated way lowers the total cost of ownership (TCO) of DR.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Interview: Understanding the difference between analytics and AI
"Artificial intelligence is defined as a computer making choices a human would normally make, however, that could mean a lot of things."
Nuix eyes legal sector as eDiscovery demand skyrockets
eDiscovery must encompass so much more than email and documents. If you haven’t looked at text messages and online chats, digital images, mobile devices, data in the cloud and social media, you’re not getting the whole story.
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
Veeam joins the ranks of $1bil-revenue software companies
It’s also marked a milestone of 350,000 customers and outlined how it will begin the next stage of its growth.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
How to train staff on security 101
Trained employees are less likely to conduct damaging activities like clicking that dodgy link in an email, or overshare on social media.Download
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Veeam enables secondary storage solutions with technology partner program
Veeam has worked with its strategic technology alliance partners to provide flexible deployment options for customers that have continually led to tighter levels of integration.
Why businesses are failing at cybersecurity
Email is the number-one vector used to initiate attacks like malware delivery, impersonations and phishing attacks.Download
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
Whitepaper: SIEM can make security practices worse – here’s how you avoid it
Security alerts will increase in both volume and diversity as enterprise networks and systems expand in parallel with a surging cybercrime community.Download
Whitepaper: Evaluating VMware Cloud on AWS
VMware Cloud on AWS allows access to the range of AWS services as an extension of an existing VMware solution.Download
Atos develops edge server with security in mind
The BullSequana Edge server is able to securely manage and process IoT data close to the source of data generation so that it is treated immediately.
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
Why you could detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Involve the players, enjoy the game: Cyber resilience the right way
The most common threats are email-borne, so it makes sense to tackle that one.Download
Is your company ready for a disaster?
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."Download
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Preventing business email compromise starts on the inside
90% of global organisations have seen phishing attack volumes increase and 40% have seen the volume of impersonation attacks increase.Download
Why NZ businesses have less than two years to adopt digital before disruption hits
Research found that digital disruption is already impacting two-thirds of New Zealand organisations.
Epson FF-680W: Powerful document reader meets high-speed photo scanning
The FF-680W scanner is the world's fastest personal photo scanner, scanning photos as fast as one photo per second at 300 dpi at up to 36 photos per batch.Download
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
Why third-party solutions are key to realising the benefits of Office 365
Research shows ongoing security concerns about email security in Office 365.Download
Fujitsu and Veeam partner to offer simplified backup and recovery
This new partnership promises the increased availability of data and faster recovery from disasters and unplanned system downtime.
You only get one chance to make a first impression
Regardless of where you come from one thing is for certain, businesses only get one chance to make a first impression.