ChannelLife UK - Industry insider news for technology resellers

Opinion stories - Page 100

Cloud21

Three ways cloud can contribute to a transformation goal

Fri, 25th Sep 2020
#
digital transformation
#
multi-cloud
#
cloud services
Cloud technology is essential for business transformation, helping organisations achieve innovation, efficiency, and customer-centricity.
Cloud security5

Why it's essential to re-write IT security for the cloud era

Tue, 22nd Sep 2020
#
cloud security
#
hybrid & remote work
#
cybersecurity
Cloud era shifts IT focus: Workforce mobility reshapes security strategies, perimeters redefine as digital transformation takes command.
Security training

How security awareness training can safeguard companies from cyber-attacks

Tue, 15th Sep 2020
#
cybersecurity
#
education, learning & training
#
opinion
Cybersecurity incidents are increasing, but many companies fail to provide security awareness training, leaving employees vulnerable to attacks.
Ai4

What's next for low-code/no-code?

Fri, 11th Sep 2020
#
apm
#
lcnc
#
ai
Low-code and no-code platforms are revolutionizing the workplace, empowering workers and boosting productivity. Find out how in this article.
Security camera

Safeguarding future cities and workplaces with video technology

Mon, 31st Aug 2020
#
saas
#
martech
#
digital entertainment
The current pandemic is driving companies to evolve faster than ever before. Video technology can help maintain a safe and compliant environment.
Header

How CleverTap can fuel your organisation's growth and drive customer retention

Thu, 27th Aug 2020
#
martech
#
marketing
#
opinion
CleverTap offers a range of marketing solutions including behavioural analytics, campaign optimisation, messaging channels, product experiences, and more.
Access management biometric

Why cybersecurity and employee experience go hand-in-hand

Tue, 25th Aug 2020
#
vpns
#
mfa
#
iam
Each individual represents an access point into the network, and one compromised user can result in a cascade of ramifications with long-lasting consequences.
Cybersecurity37

How to keep APIs secure from bot attacks

Fri, 21st Aug 2020
#
devops
#
apm
#
api
The widespread adoption of mobile & IoT devices and weak API protection are paving the way for increasing bot attacks, posing serious security risks.
Cybersecurity48

How cybersecurity leaders are overcoming the new risk landscape

Wed, 19th Aug 2020
#
malware
#
vpns
#
zero trust security
Millions of VPN users are at risk of data breaches due to an unsecured server, forcing businesses to re-evaluate cybersecurity measures.
Attivo shield

Improving network security by 'deflecting' cybercriminals

Mon, 10th Aug 2020
#
malware
#
ransomware
#
phishing
New IT defence tactic spots hidden cyber threats within networks, using strategic deflection to foil attackers.
Fraud

Beware of these six L7 DDoS attacks

Fri, 7th Aug 2020
#
ddos
#
martech
#
cybersecurity
DDoS attacks are shifting from network layer to application layer. Here are the top six application-layer DDoS attacks to watch out for.
Risk

Why risk managers are looking hard at technology risks

Fri, 7th Aug 2020
#
risk & compliance
#
opinion
#
digital risk
Risk management is vital for all organizations to mitigate technology risks that can disrupt business operations and cause financial and reputational losses.
Cas

Visibility key to resilient supply chain amid COVID-19

Thu, 30th Jul 2020
#
supply chain
#
ai
#
infor
Ideally, any party should at any time be able to answer the question: 'Where is my stuff, and when will it arrive?'.
Digital transformation4

Three key driving techniques that apply to the network

Fri, 24th Jul 2020
#
digital transformation
#
breach prevention
#
cybersecurity
Network packets can be deceptive, just like a bus full of hairdressers or a pickup truck driven by grandma. Don't assume, inspect. #networksecurity.
Cybersecurity58

Security spotlight: 15 billion user names and passwords for sale

Thu, 23rd Jul 2020
#
casb
#
cybersecurity
#
opinion
Breaches on the Dark Web, cyber-attacks by North Korea, TikTok ban concerns, an API vulnerability, and a leaky fitness platform database.
Cybersecurity22

Using risk mitigation to protect your business from cybersecurity threats

Wed, 22nd Jul 2020
#
risk & compliance
#
cybersecurity
#
opinion
As businesses go digital, the risk of cybersecurity threats rises. Effective risk mitigation can safeguard your reputation, data, and operations.
Cloud security5

Why enabling a remote workforce requires converging security at the edge

Fri, 17th Jul 2020
#
iaas
#
casb
#
dlp
Enabling a remote workforce demands edge security convergence, blending CASB, SWG, DLP, and IAM to safeguard against both internal and external threats.
Jill

Trust is central to superior DevOps culture

Fri, 17th Jul 2020
#
devops
#
apm
#
software development
The commitment to DevOps culture, driven by trust, has bolstered tech giants like Apple, Google, and Amazon during the pandemic.
Email2

Reducing the amount of time employees spend on email

Fri, 17th Jul 2020
#
email
#
opinion
#
emerging technology
Workers spend up to 6.5 hours per day on emails, causing bottlenecks and hindering productivity, says research. The solution? Reduce email time.
Automation3

How technology is driving a better way to work

Fri, 17th Jul 2020
#
uc
#
martech
#
it automation
Technology has long been feared as a job-stealer, but new tech like AI and automation can actually improve work conditions for employees.