Tech Industry

Best practices for business technology. Whether it's infrastructure, mobile, security, or operational advice, you'll find leading experts and compelling insight here.

  • Tackle the top five data challenges with SQL Server

    Webcasts // Jul 2016 // provided by Microsoft

    Join David Hobbs-Mallyon and Ramnik Gulati for this webinar examining how the top five data challenges for organisations and how to tackle them with SQL server solutions.

    Watch Now
  • It’s Time for a “Protect From Within” Mentality

    Webcasts // Jul 2016 // provided by Forcepoint

    Watch the Webcast: A Business Case for Funding Your Insider Threat Program It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast for an in-depth look at building a case for an internal program and how to establish it. Learn ...

    Watch Now
  • How Cisco’s Tackle Insider Threat Data Protection

    Webcasts // Jul 2016 // provided by Forcepoint

    Whether a disgruntled employee or simply an inadvertent mistake, your employees regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best ...

    Watch Now
  • Technologies to Thwart Insider Threats

    Webcasts // Jul 2016 // provided by Forcepoint

    Whether a disgruntled employee or simply an inadvertent mistake, your employees regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best ...

    Watch Now
  • It’s Time for a “Protect From Within” Mentality

    Webcasts // Jun 2016 // provided by Forcepoint

    Watch the Webcast: A Business Case for Funding Your Insider Threat Program It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast for an in-depth look at building a case for an internal program and how to establish it. ...

    Watch Now
  • It’s Time for a “Protect From Within” Mentality

    Webcasts // Jun 2016 // provided by Forcepoint

    Watch the Webcast: A Business Case for Funding Your Insider Threat Program It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast for an in-depth look at building a case for an internal program and how to establish it. ...

    Watch Now
  • Why Cloud? Why Not Cloud?

    Webcasts // May 2016 // provided by Interactive Intelligence

    The contact centre is at the heart of numerous government departments, and as customer expectations change rapidly, so does the need to change service delivery models. So how would the move to a cloud architecture improve the ability to deliver these changes? Interactive Intelligence alongside CIO of NSW Fire & ...

    Watch Now
  • The Rise of Red Team Operations

    Webcasts // May 2016 // provided by FireEye

    How strong is your cyber security? Join Chris Truncer, Senior Consultant at Mandiant, a FireEye company, as he provides an introduction to Mandiant Red Team Operations. Learn how Mandiant can achieve a realistic assessment of the effectiveness of your cyber security by emulating the attacker tools, tactics and practices used ...

    Watch Now
  • Webinar: The Move to Mobile-Android and iOS Attacks

    Webcasts // Jan 2016 // provided by FireEye

    Cyber attacks that target mobile apps, such as Masque attacks, are on the rise—so much so that mobile is now the fastest growing threat vector to the enterprise. Get insights into a threat group that exploit using the iOS Masque attack, and be vigilant against cyber attacks on mobile ...

    Watch Now
  • You’ve been hacked. Now what?

    Webcasts // Dec 2015 // provided by FireEye

    A network breach is not a matter of if, but when. However many companies are still a long way from having a network security posture to effectively manage or respond to today’s evolving cyber threats. Having security systems in place within your network architecture is only half the battle; todays ...

    Watch Now