LATEST NEWS

Singapore looking to integrate tech and infrastructure

Integrating Singtel’s 5G Multi-access Edge Compute with Surbana Jurong’s P24K suite of facility management systems…

NAB pushes ahead with digital banking

Investing more funds into helping customers with digital banking services. The National Australia Bank will…

Chinese port uses 5G trucks

Smart container trucks represent a new breakthrough in the smart port transformation. Recently, the international…

Mobile devices are their company’s biggest IT security threat

Changes to remote working practices made during lockdown adversely affected their cybersecurity. Mobile device and…

Global Switch enters the final stage for its Hong Kong Data Centre

Data centre construction began in 2017. Global Switch, the developer of large-scale network dense, carrier…

Worldwide semiconductor revenue grew 10.4 per cent in 2020

Revenue totalled US$466.2 billion in 2020, an increase of 10.4 per cent from 2019. Memory, GPUs…

SUBSCRIBE

UPCOMING EVENTS

Virtual Roundtable Session

14 April 2021
New Zealand

Virtual Roundtable Session

15 April 2021
Australia

Private Lunch

16 April 2021
The Babylon Restaurant, Sydney, Australia

PODCASTS

Ep 13 – Living The Life In Tech – Evan Davidson, Vice President – APJ and Jim Walter, Senior Threat Researcher at SentinelOne

29.21

Ep 12 – Living The Life In Tech – Greg Booker, Group CIO, RACQ

22.06

Ep 11 – Living The Life In Tech – Dr. Erdal Ozkaya, Regional CISO, Standard Chartered Bank

28.29

WHITE PAPERS

BSIMM11 Digest: The CISO’s Guide to Modern AppSec

Many organizations have struggled to adapt and improve their application security (AppSec) to keep pace…

Digital Transformation is the ‘new-normal’ for staying competitive

Mobiles, notebooks, tablets, social media and the like have changed behaviours across much of society.…

Continuous Application Security with HCL AppScan

This ESG Technical Review documents ESG’s evaluation and analysis of how HCL AppScan can help…

BigFix Compliance – Ensuring continuous compliance of security and regulatory policies

As the number of endpoints and the threats that can compromise them continue to grow…