Watterson Marketing Communications - Latest News [Page 3]
Boomi Activates Data For The Enterprise
Tuesday, 10 March 2026, 11:26 am | Boomi
New platform innovations activate contextual data to power production-scale enterprise AI, with a new European platform instance for localised control More >>
Nutanix Enterprise Cloud Index Finds AI Driving Rapid Container Adoption Across Australia, Shadow AI Causing Concern
Wednesday, 4 March 2026, 11:18 am | Nutanix
. This year’s report looked closely at the challenges IT local executives face as they navigate the rapid increase of AI use and need for application and infrastructure modernisation in the enterprise. More >>
VAST Data And TwelveLabs Partner To Expand Video Intelligence For The World’s Largest And Most Secure Video Archives
Tuesday, 3 March 2026, 2:10 pm | VAST Data
New collaboration expands TwelveLabs’ video foundation models beyond public cloud, introducing a first-of-its-kind customer-managed deployment on the VAST AI Operating System to power large-scale video search, analytics, and reasoning. More >>
VAST Data And CrowdStrike Partner To Establish A Unified Security Model For The AI Lifecycle
Monday, 2 March 2026, 2:21 pm | VAST Data
Joint integrations combine VAST’s native security controls with CrowdStrike’s enterprise detection and response to help secure the AI lifecycle and enhance protection at the data layer. More >>
F5 Labs Sets New Standard For AI Security Benchmarking With Model Risk Leaderboards And Threat Intelligence
Monday, 2 March 2026, 11:36 am | F 5
Comprehensive AI Security Index and Agentic Resistance Score metrics help organisations stress-test security performance of AI systems, from pilot to production More >>
VAST Data Introduces Polaris To Orchestrate Globally Distributed AI Data Infrastructure Across Hybrid Multicloud Env.
Friday, 27 February 2026, 2:15 pm | VAST Data
Included at no extra cost, Polaris complements the VAST AI Operating System by coordinating how VAST environments are deployed and operated across infrastructure boundaries. More >>
New Phishing Campaigns Weaponise Reserved Domain Name Space
Friday, 27 February 2026, 12:03 pm | Infoblox
“When we see attackers abusing .arpa, they’re weaponising the very core of the internet,” said Dr. Renée Burton, VP, Infoblox Threat Intel. More >>
87% Of Organisations Are Running Software With Known, Exploitable Vulnerabilities, Datadog Finds
Friday, 27 February 2026, 11:56 am | Datadog
Datadog researchers found that half of organisations (50 per cent) adopt new library versions within 24 hours of release, and only 4 per cent pin all public GitHub Actions to a specific version using commit hashes. More >>
VAST Data Unveils A Platform For Secure, Trusted, And Self-Learning Agentic AI Systems
Thursday, 26 February 2026, 3:54 pm | VAST Data
From A Full-Stack Agentic Computing Platform into a Secure and Scalable Thinking Machine More >>
VAST Data Introduces End-to-End Fully Accelerated AI Data Stack With NVIDIA
Thursday, 26 February 2026, 1:56 pm | VAST Data
VAST AI OS will leverage NVIDIA libraries to accelerate both compute and data services for RAG, vector search, real-time SQL, and agentic applications. More >>
Nintex Debuts New Updates To Enhance Customisation And Accessibility For Nintex K2
Wednesday, 25 February 2026, 1:07 pm | Nintex
“Like many global organisations, we need a tool to orchestrate complex, cross-system processes with confidence,” said Nick Williams, Head of Digital Workplace, Americas at Flight Centre Travel Group. More >>
Turnitin Data Shows Transparency About AI Use Benefits Students And Educators
Wednesday, 25 February 2026, 11:24 am | Turnitin
“The reality is students and educators alike are craving clear guidance on when and how to use AI,” said Chris Caren, CEO of Turnitin. More >>
Nozomi Networks Labs Report Finds Healthcare Services The Most Targeted Industry In Australia
Friday, 20 February 2026, 12:00 pm | Nozomi Networks
The report also found that in the second half of 2025, Australia produced the third highest number of alerts per organisation, increasing from fourth position in the first half of the year. More >>
Registrations Open For Datadog’s DASH 2026: The AI And Observability Event Of The Year
Thursday, 19 February 2026, 12:05 pm | Datadog
As Datadog’s flagship annual customer conference, DASH has continued to expand alongside the company’s platform and global customer base. More >>
ManageEngine Introduces Causal Intelligence And Autonomous AI To IT Operations For Faster Incident Response
Wednesday, 18 February 2026, 12:26 pm | ManageEngine
Modern IT environments are increasingly fragmented across hybrid clouds, microservices, and dynamic networks, generating massive volumes of telemetry and predictive anomaly signals every second. More >>
QSIC Turns Up Retail Media Reliability With Datadog
Tuesday, 17 February 2026, 1:10 pm | Datadog
Australia’s retail media audio platform strengthens uptime and scalability across 17,000 stores. More >>
Australian Children Spent More Than Two Hours A Day On TikTok In 2025 Prior To Ban: Qustodio Report
Tuesday, 10 February 2026, 12:06 pm | Qustodio
While AI will inevitably become a core part of work and life, parents are understandably concerned about the way children are using the AI platforms. More >>
TRENDS Unifies 50+ Systems To Build AI-Ready Manufacturing Backbone
Tuesday, 10 February 2026, 10:11 am | Boomi
Australasia’s largest branded merchandise manufacturer unifies 50+ fragmented systems with Boomi, creating a governed, near-real-time data backbone. More >>
SUSE Releases Cloud Sovereignty Self Assessment Tool To Help APAC Enterprises Navigate Preparedness For Sovereign AI
Thursday, 5 February 2026, 11:34 am | SUSE
First-of-its-kind Cloud Sovereignty tool offers guided, privacy-first scoring against new 2025 EU Cloud Sovereignty Framework, delivering a gap analysis in under 20 minutes More >>
When Your Internet’s “GPS” Starts Lying: Infoblox Threat Intel Uncovers Actor Compromising Routers
Thursday, 5 February 2026, 11:10 am | Infoblox
New Infoblox Threat Intel research reveals how attackers quietly break into routers and redirect their DNS traffic to a shadow DNS network, silently steering users through a hidden web of malicious activity. More >>
