TechDay Australia - Australia's technology news network

Debunk stories

Story image
PromoVeritas study refutes prize promotion assumptions
Fri, 5th Jan 2024
#
awards
#
study
#
roi
PromoVeritas's study debunks conventional wisdom on prize promotions, demonstrating that multiple smaller rewards drive more engagement than grand prizes, and cash prizes have fallen out of favour.
Story image
Why regulating AI could have serious ramifications
Tue, 4th Jul 2023
#
data protection
#
digital transformation
#
advanced persistent threat protection
Lately, the conversation surrounding the need to regulate Artificial Intelligence (AI) has reached a fever pitch.
Story image
Media Math VP joins iion as CCO
Wed, 3rd May 2023
#
data analytics
#
bi
#
big data
Yun Yip has been appointed as the Chief Commercial Officer at adtech startup iion, leaving her former role as VP of Media Math to bring her experience to iion.
Story image
IWD 2023: Bridging the gender gap in cybersecurity
Wed, 8th Mar 2023
#
dei
#
cybersecurity
#
careers
Cybersecurity is one of the fastest-growing industries in the world, with the rapid rollout of technology heightening the demand for IT security services.
Story image
If we’re not careful, data really could be the new oil
Wed, 15th Feb 2023
#
predictions
#
oil and gas
#
parallels
The premise that data is the modern-day equivalent of oil has largely been debunked over the last few years, but we are at a crossroads.
Story image
Bridging the gap: Busting the misconceptions of hybrid AGMs
Wed, 19th Oct 2022
#
hybrid & remote work
#
cloud services
#
wfh
Hybrid AGMs often help organisations save, rather than increase, costs. Unlike physical meetings which involve variable costs.
Story image
Debunking common data virtualisation myths
Fri, 14th Oct 2022
#
virtualisation
#
data analytics
#
planning
In the modern enterprise, data is key to helping an organisation solve business problems and be more efficient and more effective.
Story image
Threat actors ramp up their social engineering attacks
Fri, 24th Jun 2022
#
advanced persistent threat protection
#
cybersecurity
#
proofpoint
As people get better at identifying potential threats in their inbox, threat actors must evolve their methods. Their new M.O? Social engineering.
Story image
A third of financial institutions have increased AI and ML in response to money laundering
Tue, 17th Aug 2021
#
ai
#
kpmg
#
ml
A third of financial institutions are accelerating their AI and machine learning adoption for anti-money laundering technology in response to COVID-19.
Story image
Financial institutions turn to AI and ML to aid anti-money laundering efforts
Thu, 12th Aug 2021
#
ai
#
kpmg
#
sas
A third of financial institutions are speeding up their adoption of AI and ML for AML technology due to COVID-19, according to a new industry study.
Story image
Ransomware attackers bolder than ever
Tue, 18th May 2021
#
malware
#
ransomware
#
cybersecurity
Ransomware ecosystem is complex with various actors involved, says cybersecurity firm Kaspersky. Educating ourselves is key to fighting them.
Story image
Remote working is here to stay - and employees love it, says GitLab report
Wed, 11th Mar 2020
#
martech
#
apm
#
hybrid & remote work
Remote working is becoming a reality for many, with 83% of professionals saying they can accomplish all tasks remotely, according to a new report from GitLab.
Story image
DNZ20 report celebrates our nation of gaming junkies
Tue, 10th Sep 2019
#
gaming
#
digital entertainment
#
igea
New Zealanders, with an average gamer age of 34, spend 88 minutes daily playing video games, enjoying benefits for health, education, and social connections.
Story image
Four misconceptions about open source technology - Acquia
Thu, 11th Jul 2019
#
open source
#
acquia
#
debunk
Despite widespread adoption around the globe, open source technology continues to generate questions about its security and performance.
Story image
Malware and malicious Office documents on the rise in 2019 - WatchGuard
Mon, 1st Jul 2019
#
malware
#
firewalls
#
network infrastructure
Hackers are doubling down on well-known tactics like credential theft and ransomware by utilising fake Office documents and other attack avenues.
Story image
Q&A: 5G, a revolutionary future or hyped fanfare?
Wed, 12th Jun 2019
#
uc
#
digital transformation
#
5g & beyond
With governments and service providers around the world racing to roll out 5G networks in their countries, Opensignal VP Ian Fogg debunks the myths around 5G.
Story image
Going from great to greater – from big data to big impact
Tue, 23rd Apr 2019
#
data analytics
#
martech
#
planning
Despite its massive potential, Australian organisations are lagging globally in data analytics. Enhancing data strategies could unlock up to a 60% profit boost.
Story image
Thycotic debunks top Privileged Access Management myths
Tue, 23rd Apr 2019
#
pam
#
iam
#
cybersecurity
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Story image
Cradlepoint debunks common connectivity and security myths
Tue, 12th Mar 2019
#
firewalls
#
network infrastructure
#
network security
Cradlepoint tackles myths around connectivity and security, emphasising the potential and reliability of 4G, the cloud, and IoT without added risk.
Story image
Gartner debunks common AI misconceptions
Thu, 14th Feb 2019
#
ai
#
healthtech
#
analyst report
IT and business leaders must separate reality from myths about AI, Gartner says. Five common misconceptions have been identified.