TelcoNews Asia - Telecommunications news for ICT decision-makers

Opinion stories - Page 190

Iot2

Avoiding pitfalls in IoT integration - Gartner

Mon, 22nd May 2017
#
iot
#
api
#
opinion
Benoit Lheureux outlines five steps for integration leaders to address some of the most common challenges in IoT integration.
Thinkstockphotos 682289256

Building Blocks: Why installation practices make or break your data center

Fri, 19th May 2017
#
fibre
#
cable
#
opinion
Take a look at a couple of guidelines to follow during cable installation, which will help ensure success and save time in the post-installation.
Thinkstockphotos 479307106

Apple users advised to update their software now, as new security patches released

Wed, 17th May 2017
#
ios
#
apple
#
opinion
Welcome to the post-WannaCryptor world, where every computer user understands the importance of creating secure backups and applying security patches.
Thinkstockphotos 671978144

A short history of the computer password

Mon, 15th May 2017
#
malware
#
cybersecurity
#
passwords
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.
Thinkstockphotos 599477738

How to protect your organisation from WannaCry ransomware

Mon, 15th May 2017
#
malware
#
ransomware
#
ai security
Defend against the global WannaCry threat with robust cybersecurity measures and constant vigilance, says Carbon Black's team.
Thinkstockphotos 680737980

Big changes in the infosec landscape: Time to take note and take action

Mon, 15th May 2017
#
malware
#
breach prevention
#
cybersecurity
Do you like RDP? Good. So do attackers. Wait? What?! Yes, attackers love your weakly-defended RDP port as the payoff can be huge.
Thinkstockphotos 612623244

Future proofing solutions – what are we looking for in Hybrid Cloud Analytics?

Mon, 15th May 2017
#
hybrid cloud
#
data analytics
#
martech
The move towards hybrid vehicles and sports equipment has now extended to watches, but what exactly is hybrid cloud analytics?.
Thinkstockphotos 587802732

The rise of ransomware in Southeast Asia

Fri, 12th May 2017
#
malware
#
ddos
#
ransomware
It is likely that cybercriminals will target on internet of things (IOT) devices in technologically, advanced economies throughout Southeast Asia.
Thinkstockphotos 612237188 1

What we can learn from the Google Docs hack

Fri, 12th May 2017
#
malware
#
phishing
#
email security
Remember, don't be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
Thinkstockphotos 513704129

The do's and don'ts of responding to ransomware

Thu, 11th May 2017
#
malware
#
ransomware
#
cybersecurity
Ransomware set to increase in volume and variety in 2017, but a smart incident response strategy can help prevent losses.
Thinkstockphotos 594060406

The importance of integration in enterprise applications

Tue, 9th May 2017
#
uc
#
digital transformation
#
martech
Tech's evolution ushers in the era where seamless integration is vital for enterprise success; firms race to adapt.
Thinkstockphotos 674565164

DDoS: How Big Data can help combat a real and prevalent threat

Mon, 8th May 2017
#
ddos
#
data analytics
#
martech
DDoS attacks are becoming more and more prevalent. More than 2000 attacks observed every day force thousands of websites into shutdown.
Thinkstockphotos 616890412

Fingerprint security & biometrics: Three major myths busted

Mon, 8th May 2017
#
malware
#
biometrics
#
cybersecurity
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
Thinkstockphotos 676380064

No favourites here: What makes up the art of cybersecurity warfare

Mon, 8th May 2017
#
malware
#
ddos
#
ransomware
90% of major Australian businesses and government agencies have been targeted by cyber attacks in the past year.
Thinkstockphotos 497906538

Firebox Cloud: Public cloud security for small and midsize businesses

Mon, 8th May 2017
#
malware
#
firewalls
#
network infrastructure
Small and midsize firms bolster cyber defences with Firebox Cloud, bringing enterprise-level security to the public cloud.
Trail blazer

EXCLUSIVE: Trends in the UC industry and how resellers can capitalise on them

Mon, 8th May 2017
#
uc
#
martech
#
ai
Recently we spoke with tech stalwart Randy McGraw on trends in the unified communications industry and just how the channel can capitalise on them.
Thinkstockphotos 672446342

Arbor Networks: Beware of headline risk with DDoS attacks

Fri, 5th May 2017
#
ddos
#
stock exchange
#
arbor networks
DDoS myths debunked: Arbor Networks stresses the danger of headline-induced misconceptions and the necessity for robust defence strategies.
Thinkstockphotos 479631160

Fake Chrome extensions inject code into web pages

Tue, 2nd May 2017
#
malware
#
digital entertainment
#
cybersecurity
Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected.
Thinkstockphotos 674757016

Carbon Black: How to set up a threat hunting program

Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.
Thinkstockphotos 545662400

When innocent mistakes turn into costly problems

Mon, 1st May 2017
#
endpoint protection
#
edr
#
hackers
70% of firms faced pricey security breaches due to compromised accounts, careless misuse, or malicious insiders—only 1% were unscathed.