TelcoNews Asia - Telecommunications news for ICT decision-makers

Opinion stories - Page 203

Thinkstockphotos 506138260a

Most organisations unconfident in ability to protect data after breach

Tue, 14th Jun 2016
#
breach prevention
#
cybersecurity
#
opinion
The majority of IT professionals say they are not confident in their ability to keep their organization's data secure following a breach.
Future business productivity

The future of productivity for business systems

Tue, 14th Jun 2016
#
digital transformation
#
microsoft
#
intergen
Intergen's James Page heralds a 'productivity paradigm shift' in business systems, as smart tech reshapes our work future.
Scam

Hitting emails and Facebook: Ray-Ban scam is back

Mon, 13th Jun 2016
#
malware
#
cybersecurity
#
facebook
Beware as the Ray-Ban scam strikes back, targeting unsuspecting Brits with fake email offers and Facebook ads.
Thinkstockphotos 480765735

Vodafone NZ/Sky merger is good news for its competitors

Mon, 13th Jun 2016
#
uc
#
sky
#
opinion
This is good news for DTS and any other business focused ISP. Everything coming out of Vodafone and Sky seems to relate to the consumer market.
Handshake agreement

Rod Drury on major US banking announcement for Xero

Wed, 8th Jun 2016
#
uc
#
fintech
#
financial systems
We recently announced an integration with Wells Fargo, a bank serving more than three million small businesses and one in three households in the USA.
Group collaborating

Insight: Why disciplined collaboration needs flexible tools

Wed, 8th Jun 2016
#
uc
#
collaboration
#
deloitte
Collaboration brings with it many benefits to the table for an organisation, but it does require a cohesive set of protocols and procedures.
Collaboration jigsaw

Expert opinion: Cisco and IBM adopt hybrid analytics architecture to drive IoT growth

Wed, 8th Jun 2016
#
iot
#
cisco
#
ibm
The new Internet of Things (IoT) partnership between Cisco and IBM promises to enhance the companies' IoT offerings.
Thinkstockphotos 528056996

SimpliVity navigates near-term disruption to maximize hyperconverged footprint

Wed, 8th Jun 2016
#
hyperscale
#
converged infrastructure
#
dc
SimpliVity has the foundational vision and software capabilities needed to succeed in the quickly growing tide of data center industry disruption.
Thinkstockphotos 491679201

3 reasons why telecom operators should store historical data right now

Wed, 8th Jun 2016
#
uc
#
data analytics
#
martech
Big Data technologies, cloud services and price drops in storage disks have made it possible to store huge datasets.
Thinkstockphotos 488868143

Is Vision Scapegoating keeping you from collaborative change?

Wed, 8th Jun 2016
#
uc
#
devops
#
apm
Operational Dead Reckoning may help you get back on track, says Joe Auslander, Senior Agile Consultant at Assurity Consulting.
Applauding elephant

What's an ELOFANT and how can you stop them threatening your data?

Tue, 7th Jun 2016
#
network infrastructure
#
sdn
#
phishing
If you're concerned about the security of your organization's data, you should be looking out for ELOFANTs on your network.
Thinkstockphotos 528062466

How to shift the economic balance of cyber attacks

Tue, 7th Jun 2016
#
carbon black
#
opinion
#
cyber attacks
A harsh reality for the information security sector is that the businesses we are asked to protect are battling businesses that are built to attack.
Thinkstockphotos 87131374

Channeling success: Helping you and your partners derive the most from your partnership

Tue, 7th Jun 2016
#
iot
#
partner programmes
#
channel development
In spring's bloom, IBM, Cisco, and Bell Canada cultivate partnership prowess, sharing keys to a thriving channel ecosystem.
Skull hacker

Expert insight from the author of the ESET TeslaCrypt decryptor

Tue, 31st May 2016
#
malware
#
ransomware
#
cybersecurity
ESET recently interviewed the malware researcher who ultimately created the universal ESET TeslaCrypt decryption tool.
Data breach

117 million LinkedIn members compromised by 2012 data breach

Tue, 24th May 2016
#
malware
#
cybersecurity
#
linkedin
Over 117 million LinkedIn members' emails and passwords are up for sale, possibly from a 2012 breach. Password reset required.
Iot smart home

IoT Vulnerability: How to protect your smart home from security threats

Tue, 24th May 2016
#
iot
#
wireless networks
#
cloud services
With more than 5 million new devices being connected to the Internet everyday, vulnerability of IoT devices is a trending topic.
Money growing investment

Copy data virtualisation: The five ways it could save you millions this year

Mon, 23rd May 2016
#
virtualisation
#
dr
#
data analytics
You've heard of server virtualisation. You've heard of network virtualisation. But have you considered virtualising your data yet?.
Thinkstockphotos 522476560a

Adobe warns of Flash zero-day vulnerability, being actively exploited by online criminals

Tue, 17th May 2016
#
cybersecurity
#
opinion
#
flash player
As I write this, if you're running Adobe Flash on your Windows, Mac, Linux or Chrome OS computer you're potentially at risk.
Thinkstockphotos 524719448a

Data discussions daunt digital disruption

Thu, 12th May 2016
#
encryption
#
iot
#
healthtech
Over the last few weeks, there have been several items in the news that mark an increasing trend about data ownership and usage.
Thinkstockphotos 177683051a

Ransomware is not a 'malware problem' - it's a criminal business model

Thu, 12th May 2016
#
malware
#
firewalls
#
network infrastructure
Today Unit 42 published its latest paper on ransomware. It has quickly become one of the greatest cyberthreats facing organisations around the world.