Tech Industry

Best practices for business technology. Whether it's infrastructure, mobile, security, or operational advice, you'll find leading experts and compelling insight here.

  • Webinar: Office 365 business-driven provisioning deep dive

    Webcasts // Aug 2016 // provided by OKTA

    As we approach the fifth anniversary of the release of Office 365, many of the “easy” Office 365 migrations are done. Customers that are migrating to Office 365 now have much more complex requirements. Modern companies have to work around unique user access and governance challenges that may involve their ...

    View this now
  • On-Demand Webinar: Passive Detection Doesn't Work

    Webcasts // Aug 2016 // provided by FireEye

    In this webinar, we’ll look at the security ecosystem and some of the reasons why technologies that react to threat activity may not be adequate in this golden age of cyber threats. We’ll also discuss a few of the most important skill sets necessary to cultivate and why personnel and ...

    Register Now
  • Tackle the top five data challenges with SQL Server

    Webcasts // Jul 2016 // provided by Microsoft

    Join David Hobbs-Mallyon and Ramnik Gulati for this webinar examining how the top five data challenges for organisations and how to tackle them with SQL server solutions.

    Watch Now
  • It’s Time for a “Protect From Within” Mentality

    Webcasts // Jul 2016 // provided by Forcepoint

    Watch the Webcast: A Business Case for Funding Your Insider Threat Program It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast for an in-depth look at building a case for an internal program and how to establish it. Learn ...

    Watch Now
  • Technologies to Thwart Insider Threats

    Webcasts // Jul 2016 // provided by Forcepoint

    Whether a disgruntled employee or simply an inadvertent mistake, your employees regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best ...

    Watch Now
  • How Cisco’s Tackle Insider Threat Data Protection

    Webcasts // Jul 2016 // provided by Forcepoint

    Whether a disgruntled employee or simply an inadvertent mistake, your employees regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best ...

    Watch Now
  • It’s Time for a “Protect From Within” Mentality

    Webcasts // Jun 2016 // provided by Forcepoint

    Watch the Webcast: A Business Case for Funding Your Insider Threat Program It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast for an in-depth look at building a case for an internal program and how to establish it. ...

    Watch Now
  • It’s Time for a “Protect From Within” Mentality

    Webcasts // Jun 2016 // provided by Forcepoint

    Watch the Webcast: A Business Case for Funding Your Insider Threat Program It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast for an in-depth look at building a case for an internal program and how to establish it. ...

    Watch Now
  • Why Cloud? Why Not Cloud?

    Webcasts // May 2016 // provided by Interactive Intelligence

    The contact centre is at the heart of numerous government departments, and as customer expectations change rapidly, so does the need to change service delivery models. So how would the move to a cloud architecture improve the ability to deliver these changes? Interactive Intelligence alongside CIO of NSW Fire & ...

    Watch Now
  • The Rise of Red Team Operations

    Webcasts // May 2016 // provided by FireEye

    How strong is your cyber security? Join Chris Truncer, Senior Consultant at Mandiant, a FireEye company, as he provides an introduction to Mandiant Red Team Operations. Learn how Mandiant can achieve a realistic assessment of the effectiveness of your cyber security by emulating the attacker tools, tactics and practices used ...

    Watch Now