Opinion stories - Page 191
From raw data to actionable intelligence: The art and science of endpoint security
Fri, 28th Apr 2017
#
ai security
#
ai
#
microsoft
The endpoint is vulnerable. That's where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.
Young cybercriminals 'more motivated by peer respect than financial gain'
Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Unlocking the future of IoT: Five key areas to watch
Thu, 27th Apr 2017
#
ddos
#
data analytics
#
martech
Here are a few trends that make me hopeful that we're now entering a time when IoT deployments will be increasingly effective - and widespread.
Why silos belong on the farm, not in the data centre
Wed, 26th Apr 2017
#
storage
#
microsoft
#
opinion
Data storage silos stifle growth: It's time for the tech world to ditch outdated practices and embrace software independence.
Carbon Black asks: So what exactly is threat hunting?
Wed, 26th Apr 2017
#
malware
#
semiconductors
#
cybersecurity
Information security professionals used to put all of their chips towards incident prevention. This didn't work out very well.
Talend: The reality of the artificial intelligence revolution
Wed, 26th Apr 2017
#
robots
#
uc
#
martech
Talend's Jason Bissell demystifies AI, citing its growth in Asia and promising advancements in both daily life and scientific discovery.
Women in cybersecurity: Slowly but surely, change is coming
Mon, 24th Apr 2017
#
malware
#
cybersecurity
#
opinion
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.
Around 17 million websites are already powered by WordPress - are they secure?
Thu, 20th Apr 2017
#
mfa
#
iam
#
cybersecurity
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Why a VPN is essential in Australia after the Metadata Retention Law
Thu, 20th Apr 2017
#
data protection
#
vpns
#
australian government
As Australia enforces metadata retention, VPNs become crucial to safeguard privacy from government surveillance, making Get a VPN Day more relevant than ever.
Three things companies must know about data sovereignty when moving to cloud
Wed, 19th Apr 2017
#
microsoft
#
cloud services
#
servicenow
Move out of that 1980s technology stack and into the world of the cloud – you can get there with knowledge and a trusted vendor.
Asian cybersecurity confidence levels take a dip
Wed, 19th Apr 2017
#
devops
#
phishing
#
email security
With nation-state cyber attacks, malware intrusions & massive data breaches every day, it is no surprise that cybersecurity is top of mind.
The legal impact of data protection and management in the digital age
Tue, 18th Apr 2017
#
devops
#
apm
#
breach prevention
As organisations look towards data to track patterns, they should also be mindful of the legal regulations that govern data protection and breaches.
Zero day distributing FINSPY espionage malware and LATENTBOT malware
Tue, 18th Apr 2017
#
malware
#
breach prevention
#
cybersecurity
FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to download and execute a Visual Basic script.
Don't buy the elixir of youth: Machine learning is not magic
Tue, 18th Apr 2017
#
malware
#
ai
#
cybersecurity
If someone told you they had a magic elixir that would heal all your illnesses or injuries, and make you young again, would you believe them?.
When imitation is not the sincerest form of flattery
Thu, 13th Apr 2017
#
phishing
#
email security
#
cybersecurity
Early detection and effective intelligence is critical in today's digital world to mitigate the risks created by today's connected world.
Making design thinking an 'always-on activity'
Wed, 12th Apr 2017
#
martech
#
assurity
#
opinion
When operated as a continuous routine process with your customers, design learning cycles will help inform your fundamental business strategy.
How to avoid that next storage hardware refresh
Tue, 11th Apr 2017
#
storage
#
virtualisation
#
converged infrastructure
Customers tell me repeatedly that they dread the phone call from their hardware storage vendor. Every three or four years, the call is predictable.
Strategy for cyber crime: own the routers, own the Internet
Mon, 10th Apr 2017
#
router
#
carbon black
#
opinion
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.
It's time to finally say goodbye to Windows XP. And Vista. Again.
Mon, 10th Apr 2017
#
malware
#
cybersecurity
#
microsoft
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.
Complexities & challenges with ever-changing data center landscape
Wed, 5th Apr 2017
#
hyperscale
#
dc
#
colocation
IT, data center and networking professionals are regularly faced with complexities and challenges as business and customer requirements change.