Opinion stories - Page 202
Lessons from Spark's outage misfortunes
Tue, 5th Jul 2016
#
uc
#
dr
#
cloud services
Spark faces backlash after a major outage, as firms tally the high costs of similar disruption and stress the need for robust infrastructure.
Microsoft finally gives a delivery date for Windows 10 enterprise security features
Mon, 4th Jul 2016
#
microsoft
#
windows
#
ovum
Windows 10 already includes built-in protection, but the new features have been designed to thwart the escalating number of cyber-attacks.
Reinventing next-generation firewalls for coordinated protection
Tue, 28th Jun 2016
#
firewalls
#
network infrastructure
#
network security
The escalation in volume and complexity of cyber threats today have compelled organisations to turn to next-generation security solutions.
The connected classroom - the Internet of Things in education
Tue, 28th Jun 2016
#
edutech
#
iot
#
education, learning & training
There will be 37 million connected devices in New Zealand by 2020, so it's no surprise that everyone is still talking about the Internet of Things.
Cybersecurity & software vulnerability management: The ounce of prevention that's worth a pound of cure
Mon, 27th Jun 2016
#
cybersecurity
#
flexera
#
opinion
A recent cyberattack on the BBC, the New York Times & MSN saw tens of thousands of computers potentially exposed to hacker threats through online ads.
Secure the NEXT – Mitigate DDOS attacks
Mon, 27th Jun 2016
#
ddos
#
f5 networks
#
opinion
There are more than 3.4 billion internet users globally with an estimated 6.4 billion IoT devices being connected, a burgeoning exchange ecosystem.
The 5 most common reasons for corporate data loss
Mon, 27th Jun 2016
#
dlp
#
opinion
#
we live security
There is no doubt that one of the main assets of a company is the data it stores. It should be adequately protected & available when needed.
Three roadblocks stopping your customers from realising the benefits of flash storage
Mon, 27th Jun 2016
#
storage
#
hpe
#
flash storage
It used to be that the major roadblock to flash storage adoption was cost – the price-point of flash made it cost prohibitive for all but the most mis.
The JAKU botnet - what you need to know
Wed, 22nd Jun 2016
#
ddos
#
cybersecurity
#
spam
In short, botnets allow hackers to take control of multiple computers at the one time to spread viruses, create spam and perform attacks.
Insider threats escalate and thrive in the Dark Web
Wed, 22nd Jun 2016
#
cybersecurity
#
opinion
#
dark web
Disgruntled employees are gladly selling their services to the bad guys in order to inflict harm on their employers.
Misconfigured email servers open the door to spoofed emails from top domains
Wed, 22nd Jun 2016
#
datacentre infrastructure
#
cybersecurity
#
email
Less than half of the top 500 Alexa sites have configured email authentication correctly, leaving users at risk of receiving false emails.
5 key benefits of SDN in the data centre
Wed, 22nd Jun 2016
#
virtualisation
#
network infrastructure
#
hyperscale
With almost any program available at our fingertips, it is undeniable software continues to impact businesses across the board.
Scammers claim there is a virus in Apple's iTunes database
Tue, 21st Jun 2016
#
cybersecurity
#
apple
#
itunes
Scammers are once again targeting Apple customers in their attempt to hijack accounts and steal payment information. Here's the rundown.
Design thinking lies at the corner of risk management and innovation
Tue, 21st Jun 2016
#
digital transformation
#
martech
#
risk & compliance
Right now, businesses of all shapes and sizes are struggling to find the next disruptive, digital idea that will lead to exponential growth & profits.
Massive data leak in Czech Republic- and how to avoid one
Tue, 21st Jun 2016
#
data protection
#
dlp
#
data privacy
T-Mobile Czech Republic hit by unprecedented leak; 1.5m customer records stolen by employee, sparking widespread concern over data security.
Quantum Computation: A cryptography armageddon?
Mon, 20th Jun 2016
#
malware
#
quantum computing
#
cybersecurity
Cryptography is at risk of being broken by quantum computers, but post-quantum cryptography offers solutions. #PQCrypto #QuantumComputing.
New Sofacy attacks against US government agency
Wed, 15th Jun 2016
#
firewalls
#
network infrastructure
#
network security
Recently, Unit 42 identified a spear phishing e-mail from the Sofacy group that targeted the United States government - here is a rundown.
Digital asset management: What's old is new again
Wed, 15th Jun 2016
#
martech
#
marketing
#
opinion
What's old is new again. Judging from our ramping volume of client inquiry, DAM is undergoing a bit of a renaissance, albeit a quiet one.
Why did Microsoft purchase LinkedIn? A treasure trove of information
Wed, 15th Jun 2016
#
data analytics
#
martech
#
planning
Microsoft's recent purchase of LinkedIn shows that in a world of smart of machines, content is king and the new code base.
How data centers are evolving to meet Information Age demands
Tue, 14th Jun 2016
#
storage
#
hyperscale
#
converged infrastructure
It's time for next-generation data center infrastructure to help organisations take control of information, drive down complexity & equip themselves.