TelcoNews Asia - Telecommunications news for ICT decision-makers

Opinion stories - Page 191

Roi abutbul   from raw data to actionable intelligence the art and science of endpoint security

From raw data to actionable intelligence: The art and science of endpoint security

Fri, 28th Apr 2017
#
ai security
#
ai
#
microsoft
The endpoint is vulnerable. That's where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.
Thinkstockphotos 491324833

Young cybercriminals 'more motivated by peer respect than financial gain'

Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Thinkstockphotos 670632126

Unlocking the future of IoT: Five key areas to watch

Thu, 27th Apr 2017
#
ddos
#
data analytics
#
martech
Here are a few trends that make me hopeful that we're now entering a time when IoT deployments will be increasingly effective - and widespread.
Thinkstockphotos 490994789

Why silos belong on the farm, not in the data centre

Wed, 26th Apr 2017
#
storage
#
microsoft
#
opinion
Data storage silos stifle growth: It's time for the tech world to ditch outdated practices and embrace software independence.
Thinkstockphotos 512691636

Carbon Black asks: So what exactly is threat hunting?

Wed, 26th Apr 2017
#
malware
#
semiconductors
#
cybersecurity
​Information security professionals used to put all of their chips towards incident prevention. This didn't work out very well.
Thinkstockphotos 655400970

Talend: The reality of the artificial intelligence revolution

Wed, 26th Apr 2017
#
robots
#
uc
#
martech
Talend's Jason Bissell demystifies AI, citing its growth in Asia and promising advancements in both daily life and scientific discovery.
Thinkstockphotos 642442154

Women in cybersecurity: Slowly but surely, change is coming

Mon, 24th Apr 2017
#
malware
#
cybersecurity
#
opinion
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.
Thinkstockphotos 510691579

Around 17 million websites are already powered by WordPress - are they secure?

Thu, 20th Apr 2017
#
mfa
#
iam
#
cybersecurity
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Thinkstockphotos 660650894

Why a VPN is essential in Australia after the Metadata Retention Law

Thu, 20th Apr 2017
#
data protection
#
vpns
#
australian government
As Australia enforces metadata retention, VPNs become crucial to safeguard privacy from government surveillance, making Get a VPN Day more relevant than ever.
Thinkstockphotos 482254895

Three things companies must know about data sovereignty when moving to cloud

Wed, 19th Apr 2017
#
microsoft
#
cloud services
#
servicenow
Move out of that 1980s technology stack and into the world of the cloud – you can get there with knowledge and a trusted vendor.
Thinkstockphotos 610747426

Asian cybersecurity confidence levels take a dip

Wed, 19th Apr 2017
#
devops
#
phishing
#
email security
With nation-state cyber attacks, malware intrusions & massive data breaches every day, it is no surprise that cybersecurity is top of mind.
Thinkstockphotos 520166808 vrsgzec

The legal impact of data protection and management in the digital age

Tue, 18th Apr 2017
#
devops
#
apm
#
breach prevention
As organisations look towards data to track patterns, they should also be mindful of the legal regulations that govern data protection and breaches.
Thinkstockphotos 488253356

Zero day distributing FINSPY espionage malware and LATENTBOT malware

Tue, 18th Apr 2017
#
malware
#
breach prevention
#
cybersecurity
FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to download and execute a Visual Basic script.
Thinkstockphotos 187890557

Don't buy the elixir of youth: Machine learning is not magic

Tue, 18th Apr 2017
#
malware
#
ai
#
cybersecurity
If someone told you they had a magic elixir that would heal all your illnesses or injuries, and make you young again, would you believe them?.
Thinkstockphotos 489433130

When imitation is not the sincerest form of flattery

Thu, 13th Apr 2017
#
phishing
#
email security
#
cybersecurity
Early detection and effective intelligence is critical in today's digital world to mitigate the risks created by today's connected world.
Gettyimages 586936882

Making design thinking an 'always-on activity'

Wed, 12th Apr 2017
#
martech
#
assurity
#
opinion
When operated as a continuous routine process with your customers, design learning cycles will help inform your fundamental business strategy.
Thinkstockphotos 534455202

How to avoid that next storage hardware refresh

Tue, 11th Apr 2017
#
storage
#
virtualisation
#
converged infrastructure
Customers tell me repeatedly that they dread the phone call from their hardware storage vendor. Every three or four years, the call is predictable.
Thinkstockphotos 469918032

Strategy for cyber crime: own the routers, own the Internet

Mon, 10th Apr 2017
#
router
#
carbon black
#
opinion
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.
Thinkstockphotos 478338933

It's time to finally say goodbye to Windows XP. And Vista. Again.

Mon, 10th Apr 2017
#
malware
#
cybersecurity
#
microsoft
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.
Thinkstockphotos sb10069456i 001

Complexities & challenges with ever-changing data center landscape

Wed, 5th Apr 2017
#
hyperscale
#
dc
#
colocation
IT, data center and networking professionals are regularly faced with complexities and challenges as business and customer requirements change.