Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

The business-to-business market will see a number of big changes in the years to 2030, according to a new report from customer experience firm Merkle. APAC regional B2B enterprises will need to consider their levels of investment in a number of technologies and integrating new tools now to prepare for and adapt to the coming changes. The B2B Futures: The View From 2030 report argues four key “seismic” trends are coming to B2B: A rise…

Read More

Australian Organisations Face Tensions Between Personalisation, Privacy

Australian Organisations Face Tensions Between Personalisation, Privacy

Organisations in Australia face a significant challenge with data. On the one hand, there is a demand for personalised services. Consumers are willing to share their data if it means better personalisation. On the other hand, there is a real concern about privacy, and while organisations are focused on looking for ways to prevent data breaches, efforts to do better to protect customer privacy are more haphazard. Why organisations want data to deliver personalisation Personalisation…

Read More

What Australia’s Digital ID Means to How Citizens Interact With Businesses Online

What Australia’s Digital ID Means to How Citizens Interact With Businesses Online

Australia is about to get a national online ID system — the Digital ID — which promises to improve the security and privacy of data online. However, concerns among Australians persist. In just a few months, Australians will have access to a new form of ID, which aims to make identification online much safer. It’s called the Digital ID, and it will form a cornerstone of the government’s strategy to improve the security of data…

Read More

Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

The success of Australia’s six-shield cybersecurity strategy could depend on how well the nation manages the vast pools of data that will underpin the identification and mitigation of cyberthreats. Australia’s Home Affairs Minister Clare O’Neil recently revealed details of Australia’s Cyber Security Strategy 2023–2030. Designed to protect Australia in a fast-moving threat environment, the strategy would rely on building six cyber shields around the Australian nation. Jessie Jamieson, staff research engineer for decision science operations…

Read More

Protecting enterprise data — wherever it lives

Protecting enterprise data — wherever it lives

Protecting enterprise data — wherever it lives | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

81% of organizations have implemented policies around generative AI

81% of organizations have implemented policies around generative AI

81% of organizations have implemented policies around generative AI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The 5 pillars of cloud security for data storage

The 5 pillars of cloud security for data storage

The 5 pillars of cloud security for data storage | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How to assess and bolster an organization’s level of cybersecurity

How to assess and bolster an organization’s level of cybersecurity

How to assess and bolster an organization’s level of cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Data security governance strategies can be a business differentiator

Data security governance strategies can be a business differentiator

Data security governance strategies can be a business differentiator | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3