Stories by Staff - Page 5
Driverless cars: A new way of life and a new cybersecurity challenge
Tue, 25th Oct 2016
#
firewalls
#
network infrastructure
#
network security
A driverless car is a very advanced mode of transportation, possibly even without a readily available steering wheel.
IoT devices creating massive DDoS botnets
Fri, 30th Sep 2016
#
malware
#
ddos
#
iot
Over the last two weeks, two of the largest DDoS attack ever recorded have been executed against security journalist Brian Krebs and OVH.
Ignite 2016: Move your business communication to Skype
Thu, 29th Sep 2016
#
uc
#
microsoft
#
voip
Over the past year we've been working on making the best experience for communicating with others, across all the devices you use for work.
8 years of Android: malware, malicious apps, and how to stay safe
Mon, 26th Sep 2016
#
malware
#
semiconductors
#
cybersecurity
Android now controls over 85% of the smartphone market and is by far the biggest player in the tablet market as well.
10 cybersecurity lessons learned from Season 2 of Mr. Robot
Mon, 26th Sep 2016
#
robots
#
cybersecurity
#
mr.robot
Cybersecurity and hacking are just plot devices the series uses to achieve its goals, but they play a major role in the series.
Carbon Black discovers new adware related threat
Mon, 26th Sep 2016
#
cybersecurity
#
carbon black
These obfuscation techniques easily evade sandboxing and other intrusion detection techniques due to Binary Fragmentation.
How subsea cable innovation is meeting surging network bandwidth demand
Mon, 26th Sep 2016
#
network infrastructure
#
hyperscale
#
dc
The benefits of the data center model are significant, and we anticipate it will be adopted by numerous subsea cable projects in the coming years.
Business security: Securing your data weak points
Tue, 13th Sep 2016
#
cybersecurity
#
we live security
#
retail
So where do I start? There are core tenets that will end up being repeated but here a few essential points to consider.
How interconnection increased global data flows by 45X
Mon, 12th Sep 2016
#
hyperscale
#
dc
#
colocation
Global data flows surge 45x in a decade, driving a digital economy boom and reshaping global GDP, McKinsey report reveals.
Ransomware: To pay or not to pay, that is the question
Tue, 6th Sep 2016
#
malware
#
ransomware
#
cybersecurity
We sometimes hear of instances where organisations pay ransomware even though they do have backups because it's the cheaper option.
About digital transformation and building a wider moat
Tue, 6th Sep 2016
#
digital transformation
#
hyperscale
#
dc
The digitization of the global economy is disruptive for businesses, but also brings opportunities for Equinix.
Xero's Singapore expansion a two-way learning experience
Mon, 18th Jul 2016
#
fintech
#
financial systems
#
xero
Xero's expansion into Singapore is proving to be a challenging endeavour with 'massive potential' for the company, but there's still work to do.
From a drip to a flood - the impact of a data leak
Tue, 14th Jun 2016
#
cybersecurity
#
data leak
#
cyber attacks
Data leaks, especially from an organization's point of view, are a huge and growing problem, as the fallout can be devastating.
Data-centric security for the Internet of Things
Thu, 19th May 2016
#
data protection
#
data analytics
#
martech
The Internet of Things (IoT) & its dependence on the cloud has created new, critical security challenges in the escalating fight against cyber-crime.
Companies fear data breaches caused by compromised credentials
Mon, 2nd May 2016
#
malware
#
breach prevention
#
cybersecurity
Cloud Security Alliance (CSA) report reveals that compromised credentials are the main cause of data breaches, according to surveyed security professionals.
From SAMR to signage
Wed, 23rd Mar 2016
#
digital signage
#
trilbytv
#
pro av
UK schools miss the mark in using digital signage, with ineffective content and heavy IT systems hampering educational outcomes.
Five tips for choosing the right Cloud backup provider
Wed, 16th Mar 2016
#
dr
#
healthtech
#
cloud services
Secure, compliant, restorable: Key criteria for selecting your ideal cloud backup partner to safeguard vital business data.
The surprisingly scary patterns revealed in hack attacks
Thu, 3rd Mar 2016
#
cybersecurity
#
software development
#
hackers
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.
Is there a way to sync, share and control data securely?
Wed, 2nd Mar 2016
#
storage
#
data protection
#
dr
As employees and partners collaborate through file sync and sharing services, sensitive data is often put at risk of compromise and non-compliance.
Going mobile: How to have secure file-sharing, backup recovery and access
Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation's data in a world where your employees, contractors and partners are working on mobile devices?.