Oh no Lenovo!

Oh no Lenovo!

The past few weeks haven't been great for Lenovo, and rightly so. Security researchers recently discovered that consumer-grade Lenovo computers ship with software called Superfish Visual Discovery that injects advertising (using web-intercepting technology from...

Security and sovereignty biggest concerns with growing cloud adoption

Security and sovereignty biggest concerns with growing cloud adoption

New research from Vanson Bourne (commissioned by Tata Communications) reinforces that cloud can help make IT more relevant to the business. And while this isn't exactly news, it is good to see that cloud computing is finally being recognised for its ability to...

Target malware attack – what have we learnt?

Target malware attack – what have we learnt?

It wasn't just Santa on the move in December 2013. Target in the US had just suffered a severe security breach that resulted in 40 million accounts being accessed and the credit and debit card details being appropriated by hackers. A month later they announced that...

blueAPACHE launches new awareness campaign

blueAPACHE launches new awareness campaign

blueAPACHE today launched it's new awareness campaign in Melbourne. The campaign targets digital mediums across Melbourne CBD and Southbank. Designed to remind businesses that they don't need to build infrastructure in order to access the latest technology, the...

blueAPACHE continue investing in Voice as a Service

blueAPACHE continue investing in Voice as a Service

Press Release.  Melbourne, Australia – blueAPACHE has continued its focus on Voice and Unified Communications as a Service by procuring Senior Voice Specialist, Dave Saunders. With 12 years experience in Unified Communications and consulting engagements to Telstra, BP...

Cloud Defined: The top 10 benefits

Cloud Defined: The top 10 benefits

Cloud computing, often referred to as simply 'the cloud', is the delivery of on-demand computing services - everything from applications to data centres - over the Internet on a pay-for-use basis. These services can include software, compute and storage, or computing...

Palo Alto Traps – next generation endpoint security

Palo Alto Traps – next generation endpoint security

The challenge with signature based security and antivirus tools is you are vulnerable until the signature is released and distributed by the vendors. Palo Alto takes a different approach with it's new Traps Endpoint Security that was recently released in the US. While...

Deloitte 2015 TMT Predictions released

Deloitte 2015 TMT Predictions released

Earlier this week in Sydney, Deloitte released their Technology, Media and Telecommunications (TMT) Predictions report for the coming year. The objective of 2015 TMT Predictions is to analyse the key market developments taking place across the globe over the next...

Hackers become even more accessible

Hackers become even more accessible

A new website has been launched that mirrors oDesk.com, Freelancer.com, Elance.com and similar freelancing sites that connects consumers with service providers. This time round, the service is hacking. Registered in New Zealand, the site connects customers and...