ChannelLife UK - Industry insider news for technology resellers

Stories by Staff - Page 5

Thinkstockphotos 537550524

Driverless cars: A new way of life and a new cybersecurity challenge

Tue, 25th Oct 2016
#
firewalls
#
network infrastructure
#
network security
A driverless car is a very advanced mode of transportation, possibly even without a readily available steering wheel.
Thinkstockphotos 497653044

IoT devices creating massive DDoS botnets

Fri, 30th Sep 2016
#
malware
#
ddos
#
iot
Over the last two weeks, two of the largest DDoS attack ever recorded have been executed against security journalist Brian Krebs and OVH.
Thinkstockphotos 522131988

Ignite 2016: Move your business communication to Skype

Thu, 29th Sep 2016
#
uc
#
microsoft
#
voip
Over the past year we've been working on making the best experience for communicating with others, across all the devices you use for work.
Thinkstockphotos 589121030

8 years of Android: malware, malicious apps, and how to stay safe

Mon, 26th Sep 2016
#
malware
#
semiconductors
#
cybersecurity
Android now controls over 85% of the smartphone market and is by far the biggest player in the tablet market as well.
Download

10 cybersecurity lessons learned from Season 2 of Mr. Robot

Mon, 26th Sep 2016
#
robots
#
cybersecurity
#
mr.robot
Cybersecurity and hacking are just plot devices the series uses to achieve its goals, but they play a major role in the series.
Thinkstockphotos 513120870

Carbon Black discovers new adware related threat

Mon, 26th Sep 2016
#
cybersecurity
#
carbon black
These obfuscation techniques easily evade sandboxing and other intrusion detection techniques due to Binary Fragmentation.
Thinkstockphotos 468196592

How subsea cable innovation is meeting surging network bandwidth demand

Mon, 26th Sep 2016
#
network infrastructure
#
hyperscale
#
dc
The benefits of the data center model are significant, and we anticipate it will be adopted by numerous subsea cable projects in the coming years.
Thinkstockphotos 484347847

Business security: Securing your data weak points

Tue, 13th Sep 2016
#
cybersecurity
#
we live security
#
retail
So where do I start? There are core tenets that will end up being repeated but here a few essential points to consider.
Thinkstockphotos 543081358

How interconnection increased global data flows by 45X

Mon, 12th Sep 2016
#
hyperscale
#
dc
#
colocation
Global data flows surge 45x in a decade, driving a digital economy boom and reshaping global GDP, McKinsey report reveals.
Thinkstockphotos 522749369

Ransomware: To pay or not to pay, that is the question

Tue, 6th Sep 2016
#
malware
#
ransomware
#
cybersecurity
We sometimes hear of instances where organisations pay ransomware even though they do have backups because it's the cheaper option.
Thinkstockphotos 153681911

About digital transformation and building a wider moat

Tue, 6th Sep 2016
#
digital transformation
#
hyperscale
#
dc
The digitization of the global economy is disruptive for businesses, but also brings opportunities for Equinix.
Thinkstockphotos 177001739

Xero's Singapore expansion a two-way learning experience

Mon, 18th Jul 2016
#
fintech
#
financial systems
#
xero
Xero's expansion into Singapore is proving to be a challenging endeavour with 'massive potential' for the company, but there's still work to do.
Thinkstockphotos 515643568

From a drip to a flood - the impact of a data leak

Tue, 14th Jun 2016
#
cybersecurity
#
data leak
#
cyber attacks
Data leaks, especially from an organization's point of view, are a huge and growing problem, as the fallout can be devastating.
Thinkstockphotos 141115581a

Data-centric security for the Internet of Things

Thu, 19th May 2016
#
data protection
#
data analytics
#
martech
The Internet of Things (IoT) & its dependence on the cloud has created new, critical security challenges in the escalating fight against cyber-crime.
Pad

Companies fear data breaches caused by compromised credentials

Mon, 2nd May 2016
#
malware
#
breach prevention
#
cybersecurity
Cloud Security Alliance (CSA) report reveals that compromised credentials are the main cause of data breaches, according to surveyed security professionals.
Students ipad

From SAMR to signage

Wed, 23rd Mar 2016
#
digital signage
#
trilbytv
#
pro av
UK schools miss the mark in using digital signage, with ineffective content and heavy IT systems hampering educational outcomes.
Five stars hands

Five tips for choosing the right Cloud backup provider

Wed, 16th Mar 2016
#
dr
#
healthtech
#
cloud services
Secure, compliant, restorable: Key criteria for selecting your ideal cloud backup partner to safeguard vital business data.
Cyber hack pattern

The surprisingly scary patterns revealed in hack attacks

Thu, 3rd Mar 2016
#
cybersecurity
#
software development
#
hackers
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.
Sync and share cloud

Is there a way to sync, share and control data securely?

Wed, 2nd Mar 2016
#
storage
#
data protection
#
dr
As employees and partners collaborate through file sync and sharing services, sensitive data is often put at risk of compromise and non-compliance.
Byod blue background

Going mobile: How to have secure file-sharing, backup recovery and access

Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation's data in a world where your employees, contractors and partners are working on mobile devices?.