Opinion stories - Page 190
Avoiding pitfalls in IoT integration - Gartner
Mon, 22nd May 2017
#
iot
#
api
#
opinion
Benoit Lheureux outlines five steps for integration leaders to address some of the most common challenges in IoT integration.
Building Blocks: Why installation practices make or break your data center
Fri, 19th May 2017
#
fibre
#
cable
#
opinion
Take a look at a couple of guidelines to follow during cable installation, which will help ensure success and save time in the post-installation.
Apple users advised to update their software now, as new security patches released
Wed, 17th May 2017
#
ios
#
apple
#
opinion
Welcome to the post-WannaCryptor world, where every computer user understands the importance of creating secure backups and applying security patches.
A short history of the computer password
Mon, 15th May 2017
#
malware
#
cybersecurity
#
passwords
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.
How to protect your organisation from WannaCry ransomware
Mon, 15th May 2017
#
malware
#
ransomware
#
ai security
Defend against the global WannaCry threat with robust cybersecurity measures and constant vigilance, says Carbon Black's team.
Big changes in the infosec landscape: Time to take note and take action
Mon, 15th May 2017
#
malware
#
breach prevention
#
cybersecurity
Do you like RDP? Good. So do attackers. Wait? What?! Yes, attackers love your weakly-defended RDP port as the payoff can be huge.
Future proofing solutions – what are we looking for in Hybrid Cloud Analytics?
Mon, 15th May 2017
#
hybrid cloud
#
data analytics
#
martech
The move towards hybrid vehicles and sports equipment has now extended to watches, but what exactly is hybrid cloud analytics?.
The rise of ransomware in Southeast Asia
Fri, 12th May 2017
#
malware
#
ddos
#
ransomware
It is likely that cybercriminals will target on internet of things (IOT) devices in technologically, advanced economies throughout Southeast Asia.
What we can learn from the Google Docs hack
Fri, 12th May 2017
#
malware
#
phishing
#
email security
Remember, don't be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
The do's and don'ts of responding to ransomware
Thu, 11th May 2017
#
malware
#
ransomware
#
cybersecurity
Ransomware set to increase in volume and variety in 2017, but a smart incident response strategy can help prevent losses.
The importance of integration in enterprise applications
Tue, 9th May 2017
#
uc
#
digital transformation
#
martech
Tech's evolution ushers in the era where seamless integration is vital for enterprise success; firms race to adapt.
DDoS: How Big Data can help combat a real and prevalent threat
Mon, 8th May 2017
#
ddos
#
data analytics
#
martech
DDoS attacks are becoming more and more prevalent. More than 2000 attacks observed every day force thousands of websites into shutdown.
Fingerprint security & biometrics: Three major myths busted
Mon, 8th May 2017
#
malware
#
biometrics
#
cybersecurity
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
No favourites here: What makes up the art of cybersecurity warfare
Mon, 8th May 2017
#
malware
#
ddos
#
ransomware
90% of major Australian businesses and government agencies have been targeted by cyber attacks in the past year.
Firebox Cloud: Public cloud security for small and midsize businesses
Mon, 8th May 2017
#
malware
#
firewalls
#
network infrastructure
Small and midsize firms bolster cyber defences with Firebox Cloud, bringing enterprise-level security to the public cloud.
EXCLUSIVE: Trends in the UC industry and how resellers can capitalise on them
Mon, 8th May 2017
#
uc
#
martech
#
ai
Recently we spoke with tech stalwart Randy McGraw on trends in the unified communications industry and just how the channel can capitalise on them.
Arbor Networks: Beware of headline risk with DDoS attacks
Fri, 5th May 2017
#
ddos
#
stock exchange
#
arbor networks
DDoS myths debunked: Arbor Networks stresses the danger of headline-induced misconceptions and the necessity for robust defence strategies.
Fake Chrome extensions inject code into web pages
Tue, 2nd May 2017
#
malware
#
digital entertainment
#
cybersecurity
Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected.
Carbon Black: How to set up a threat hunting program
Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.
When innocent mistakes turn into costly problems
Mon, 1st May 2017
#
endpoint protection
#
edr
#
hackers
70% of firms faced pricey security breaches due to compromised accounts, careless misuse, or malicious insiders—only 1% were unscathed.