Agile Digital Transformation

The Top 4 Reasons Your Business Should Conduct a Network Assessment

Why perform a network assessment? There are a number of business benefits of conducting a network assessment. It goes far beyond a maintenance check – providing a key enabler for strategic planning and growth. Undertaking a network assessment may include an analysis of security vulnerabilities, hardware and software alerts, inventory listing of your network devices, […]

Startup Journeys

Finding the Steve Jobs of Social: Birth of Australian Social Commerce Startup Konvo

Imagine a platform that can help declutter and unlock the business value of social conversations. That is exactly what Brisbane-based startup Konvo™ is about. Konvo synergises a range of IBM technologies to deliver an innovative Social Commerce (SoCom) Platform that transforms social networking. IBM solutions including cloud hosting, application development and testing, Cognitive API, and […]

Cyber Security as Strategic Advantage and Growth Enabler

Cyber Security is no longer just about risk management and resilience. Cyber Security is now instrumental to an organisation’s growth and a key enabler for digital innovation. Let’s take a closer look at five ways Cyber Security can create strategic advantage and differentiation for your organisation.

Continue reading

Re-thinking retail: Creating an omnichannel strategy for a SME

[Reading time: 5 minutes] Online shopping has become an integral part of modern day consumption. While consumers enjoy convenience and abundant choice, the most successful SME (“Small-Medium sized Enterprise”) retailers continuously invest in research and infrastructure to maximize the impact of their physical stores and online experience. IT Spend for SMEs The current competitive landscape […]

Continue reading

Investing in Mobile Apps: The Mobile Mind-shift

[5 minute read] Ask any business leader what the first thing they reach for in the morning is and I’m willing to bet their response is: “my phone”. The same dynamic holds true for the employees within their business, for external stakeholders and importantly, among current and prospective customers. Subscription-based software has enabled small and […]

Continue reading

‘Tis the Season to be Jolly: Get Free Cisco Live 2017 Pass!

Here’s an exciting holiday season offer you won’t want to miss! IBM is now offering you a FREE Cisco Live 2017 full conference pass worth $2,000 for every $100,000USD of eligible Cisco product families you purchase*. In other words, the more you buy, the more free tickets you receive. Wait, it gets better! We are […]

Continue reading

Could Pokémon Go Turn into Your Mobile Security Nightmare?

Augmented reality game app Pokémon Go has taken Australia and New Zealand by storm. With player numbers skyrocketing, cyber criminals were quick to act. Its servers were reportedly taken down by a denial of service (DDoS) hacker attack on July 16. Exploiting the phenomenal hype, fake apps have mushroomed to trick hungry users.

Continue reading

How Much Will a Data Breach Really Cost Your Organisation?

Did you know? The average cost per lost or stolen data record is $142. What would be the true cost to your organisation in the event of a data breach? Hailed as the industry’s gold-standard benchmark research, Ponemon Institute’s latest independent study details both the costs and impact of data breaches for organisations in ANZ.

Continue reading

3 Major Trends to Watch in Threat Intelligence

By cross-referencing key findings from the global 2016 IBM® X-Force® Cyber Security Intelligence Index with results from the Australia Cyber Security Centre (ACSC) survey of major Australian businesses, we have identified three major trends to watch in the cyber crime and threat landscape.

Continue reading

Webinar: Manage Mobile Threats with Security Intelligence and Event Management 18 Aug

Recent research shows that mobile has become the hackers’ new playground. In this session learn how to identify mobile threats and protect against malicious activity with a comprehensive approach that combines enterprise mobility management (EMM) and SIEM.

Continue reading

Fast Track Cyber Security: Network and Endpoint Protection

You can now fast track cyber security with an IBM Security solution package designed for mid-size, growing organisations needing a cost-effective yet robust approach. The QRadar security intelligence platform and MaaS360 unified mobility management provide multi-layered protection for your network, mobile and endpoints.

Continue reading