TelcoNews Asia - Telecommunications news for ICT decision-makers

Opinion stories - Page 200

Thinkstockphotos 511473492

Is distributed analytics the solution to a connected world of data?

Mon, 22nd Aug 2016
#
data analytics
#
martech
#
planning
Distributed analytics could be a game changer, integrating new data sources into legacy systems without squandering prior investments.
Data out the backdoor

EXPERT INSIGHTS: Why every endpoint is a potential entry point

Thu, 18th Aug 2016
#
endpoint protection
#
edr
#
cybersecurity
Rising threats at every turn as enterprises face a surge in endpoint vulnerabilities; experts urge a multi-layered defence.
Aaeaaqaaaaaaaalaaaaajdnkztdmymy0lty2mwqtngu2ys05ode1ltg0zjziyta2n2fiyw

Building Microsoft's hyper-scale cloud

Thu, 18th Aug 2016
#
datacentre infrastructure
#
hyperscale
#
dc
As one of the largest cloud operators in the world, Microsoft's hyper-scale workloads have changed the way we design and operate data centers.
Thinkstockphotos 511068346

Nemucod is back and serving an ad-clicking backdoor instead of ransomware

Mon, 15th Aug 2016
#
malware
#
cybersecurity
#
trojan
The trojan downloader Nemucod is back with a new campaign. This time, it has changed the payload served to its victims – it's not ransomware.
Thinkstockphotos 489809364

Symantec: How Instagram accounts were hacked & altered to promote adult dating spam

Mon, 15th Aug 2016
#
symantec
#
instagram
#
opinion
Symantec comments on the influx of fake Instagram profiles luring users to adult dating sites. Now Instagram's being hacked to promote adult spam.
Thinkstockphotos 579158096

Old Facebook scam gets ready for new boost

Mon, 15th Aug 2016
#
malware
#
email security
#
cybersecurity
ESET researchers are warning about Facebook hoax scams that spread fake terror news to trick victims into disclosing their Facebook credentials.
Thinkstockphotos 489222783

Uncovering growth opportunities in the transforming business analytics market

Mon, 15th Aug 2016
#
data analytics
#
martech
#
planning
Vendors need to take a bi-modal approach to how you build your product portfolio as well as how you go-to-market.
Thinkstockphotos 577647368

Digital Realty talks software-defined networking: Opportunities for the data center

Thu, 11th Aug 2016
#
hyperscale
#
dc
#
colocation
For years, networking within data centers could not be accomplished without iron, components and switches that make PoP hardware.
Untitled

Turning up the security heat on IoT: TRANE Comfortlink XL850

Tue, 9th Aug 2016
#
iot
#
wireless networks
#
cloud services
IoT is proving a minefield of security hazards. Trustwave researcher Jeff Kitson finds a problem with TRANE's Comfortlink XL850 thermostat.
Thinkstockphotos 496105004

How to staff your team across the security kill chain

Mon, 8th Aug 2016
#
cybersecurity
#
mssp
#
carbon black
Effective digital security needs people as well as technology. Most organisations are aware of the need to staff up to improve their security.
Thinkstockphotos 488027853

Afraid someone is misusing your webcam? Here's some tips for protection

Mon, 8th Aug 2016
#
cybersecurity
#
opinion
#
webcam
If you want to know which programs are using your webcam, or if you believe it is running despite the indicator light being off, here is a guide.
Thinkstockphotos 544353476

How to streamline branch office connectivity with SD-WAN

Thu, 4th Aug 2016
#
network infrastructure
#
sd-wan
#
sdn
Connecting branch offices to an enterprise wide area network (WAN) is time-consuming and often disrupts an organisation's IT operations.
Thinkstockphotos 149046319

Firefighting, security and compliance - are they separate issues?

Thu, 4th Aug 2016
#
cybersecurity
#
cloud services
#
opinion
Sometimes a critical issue like a virus outbreak or a major systems malfunction, sometimes something as urgent as a VSIP.
Thinkstockphotos 486793682

Heard of Jackware? When connected cars meet ransomware

Tue, 2nd Aug 2016
#
malware
#
ransomware
#
cartech
I define jackware as malicious software that seeks to take control of a device, the purpose of which is not data processing or digital communications.
Thinkstockphotos 536892903

PowerWare ransomware imitates locky malware family

Mon, 1st Aug 2016
#
malware
#
firewalls
#
network infrastructure
PoshCoder has been encrypting files with PowerShell since 2014, and the new variant named PowerWare was reported in March 2016.
Detective magnifying glass

Can you detect advanced threats with just Flows/IPFIX?

Mon, 1st Aug 2016
#
firewalls
#
network infrastructure
#
network security
Do we have enough data to detect an advanced threat? Let's have a discussion on the usefulness of netflow-type data.
Thinkstockphotos 502127770

Big data: Could the end really be in sight?

Mon, 1st Aug 2016
#
data analytics
#
martech
#
iot
I can't say I love the term Big Data. How big is big? When it comes to data, often what was big last year is just the norm this year.
Thinkstockphotos 543829580

Attack delivers '9002' trojan through google drive

Fri, 29th Jul 2016
#
cybersecurity
#
google
#
trojan
Unit 42 recently observed a 9002 Trojan delivered using a combination of shortened links and a shared file hosted on Google Drive.
Thinkstockphotos 519156492

Ericsson faces a rocky road - will its premium brand survive?

Wed, 27th Jul 2016
#
uc
#
ericsson
#
opinion
Ericsson's CEO Hans Vestberg resigns amidst financial turmoil and corruption probes, casting doubt on the future of its premium branding.
Data centre

It's time to get ready for tomorrow's digital data centers

Fri, 22nd Jul 2016
#
hyperscale
#
dc
#
colocation
Utilizing a wider digital ecosystem can give an organisation a competitive edge while enabling it to evolve with data center advancements.