Stories by Staff - Page 9
10 cybersecurity lessons learned from Season 2 of Mr. Robot
Mon, 26th Sep 2016
#
robots
#
cybersecurity
#
mr.robot
Cybersecurity and hacking are just plot devices the series uses to achieve its goals, but they play a major role in the series.
Carbon Black discovers new adware related threat
Mon, 26th Sep 2016
#
cybersecurity
#
carbon black
These obfuscation techniques easily evade sandboxing and other intrusion detection techniques due to Binary Fragmentation.
How subsea cable innovation is meeting surging network bandwidth demand
Mon, 26th Sep 2016
#
network infrastructure
#
hyperscale
#
dc
The benefits of the data center model are significant, and we anticipate it will be adopted by numerous subsea cable projects in the coming years.
Selling enterprise security solutions - tips for success
Tue, 20th Sep 2016
#
firewalls
#
network infrastructure
#
network security
Ingram Micro's Andrew Khan shares proven sales strategies for demonstrating return on investment when pitching security solutions to NZ businesses.
Why the internet's subsea backbone needs direct interconnection
Wed, 14th Sep 2016
#
network infrastructure
#
hyperscale
#
dc
Fast interconnection isn't enough. It's got to be as fast or faster than the competition, and direct interconnection is the fastest there is.
Business security: Securing your data weak points
Tue, 13th Sep 2016
#
cybersecurity
#
we live security
#
retail
So where do I start? There are core tenets that will end up being repeated but here a few essential points to consider.
How interconnection increased global data flows by 45X
Mon, 12th Sep 2016
#
hyperscale
#
dc
#
colocation
Global data flows surge 45x in a decade, driving a digital economy boom and reshaping global GDP, McKinsey report reveals.
Making Google a little bit faster across Asia
Fri, 9th Sep 2016
#
network infrastructure
#
hyperscale
#
dc
You may not notice right away, but this new cable should help Google products and services load more quickly across the region.
Ransomware: To pay or not to pay, that is the question
Tue, 6th Sep 2016
#
malware
#
ransomware
#
cybersecurity
We sometimes hear of instances where organisations pay ransomware even though they do have backups because it's the cheaper option.
About digital transformation and building a wider moat
Tue, 6th Sep 2016
#
digital transformation
#
hyperscale
#
dc
The digitization of the global economy is disruptive for businesses, but also brings opportunities for Equinix.
Could Edge Computing have solved Pokémon GO's server issues?
Mon, 22nd Aug 2016
#
gaming
#
datacentre infrastructure
#
hyperscale
Edge Computing is gaining popularity as an alternative to conventional approaches where the data centre can be remote and geographically distant.
Adobe's new editing app gives users the spark they need
Wed, 10th Aug 2016
#
martech
#
adobe
#
adobe spark
Adobe releases Spark for users to create and publish their content on their own devices, without the need of a professional set up.
Here's how broadband CAN be used for critical WAN tasks
Wed, 27th Jul 2016
#
uc
#
network infrastructure
#
sd-wan
SD-WAN has graduated to hot topic status in tech circles, and enterprises are turning to this new approach to resolve their connectivity issues.
Crowd testing in the Digital Age - why is it growing so fast?
Mon, 11th Jul 2016
#
data analytics
#
martech
#
planning
Crowd testing is becoming a popular tool for ensuring application quality in digital organisations. The question is, why?.
From a drip to a flood - the impact of a data leak
Tue, 14th Jun 2016
#
cybersecurity
#
data leak
#
cyber attacks
Data leaks, especially from an organization's point of view, are a huge and growing problem, as the fallout can be devastating.
Windows flaw enhances DNS hijacking
Tue, 7th Jun 2016
#
malware
#
cybersecurity
#
microsoft
ESET discovers new version of DNS Unlocker with sneaky capabilities to re-configure DNS settings on victims' computers.
Data-centric security for the Internet of Things
Thu, 19th May 2016
#
data protection
#
data analytics
#
martech
The Internet of Things (IoT) & its dependence on the cloud has created new, critical security challenges in the escalating fight against cyber-crime.
The customer experience expectation gap
Mon, 16th May 2016
#
crm
#
uc
#
cx
Last Monday afternoon, as I rode to JFK Airport en route to a conference, I realized that I'd left my travel credit card on my dresser.
Has IoT increased our exposure to cyber threats?
Thu, 12th May 2016
#
mdm
#
iot
#
supply chain
Cybersecurity is already top of the agenda for many corporate boards, but the scale and scope of the Internet of Things escalates security risk.
Modular Magic: How a non-traditional modular data centre can bring you significant savings
Thu, 12th May 2016
#
hyperscale
#
dc
#
colocation
Modular data centres cut costs and energy use, an innovative silver bullet for the tech-hungry modern economy.