Opinion stories - Page 105
Who is really responsible for cloud security?
Wed, 3rd Jul 2019
#
saas
#
firewalls
#
network infrastructure
Experts at the NetEvents EMEA Press Spotlight emphasised the critical need for enterprises to understand the Shared Responsibility Model in cloud security.
How to stop your data from getting hijacked - SolarWinds
Wed, 3rd Jul 2019
#
data protection
#
solarwinds
#
opinion
Organisations often struggle to avoid man-in-the-middle attacks because hackers target infrastructure the organisation has almost no control over.
TechDay expansion continues with new CFOtech sites
Thu, 20th Jun 2019
#
data analytics
#
digital transformation
#
fintech
TechDay debuts CFOtech, a fresh site trio for finance chiefs in Asia-Pacific, sparking tech-savvy business evolution.
Meeting the card payment industry's compliance requirements - Kemp
Tue, 18th Jun 2019
#
ddos
#
risk & compliance
#
credit card fraud
eCommerce fraud boom leads to a surge in CNP crime, spotlighting vital PCI-DSS compliance and advanced security tech.
The evolution of data centres to accommodate edge computing
Mon, 10th Jun 2019
#
edge computing
#
data center on demand
#
opinion
Data centres are evolving to meet the demands of edge computing in 2019, driven by AI and IoT, facilitating faster, localised decision-making.
How Agile will expose your decision-making effectiveness
Thu, 30th May 2019
#
devops
#
apm
#
software development
Adopting Agile methodologies is not enough; decision-making speed and quality hinge on leveraging artificial intelligence, McKinsey reports.
Look before you leap: Making a name for yourself as a tech startup
Mon, 27th May 2019
#
physical security
#
branding
#
intellectual property
For tech startups, the necessity of brand protection is too often thrown in the 'too hard' or 'too expensive' basket or simply overlooked.
The impact of bringing biometrics to the door
Wed, 22nd May 2019
#
biometrics
#
opinion
#
hid global
Biometrics, such as fingerprint authentication, are being adopted by enterprises to improve security and convenience.
Exploring the different needs for cloud services across Europe
Wed, 22nd May 2019
#
cloud security
#
multi-cloud
#
cloud marketplace
Although digital transformation is happening across Europe, each country continues to have its own IT needs and the different cloud markets highlight this.
Forget endpoints—it's time to secure people instead
Thu, 16th May 2019
#
malware
#
wireless networks
#
zero trust security
Security paradigms need a shift; as mobile work ensues, companies must pivot from endpoint protection to securing the actual users.
3 ways cloud & colocation providers can use renewables
Wed, 15th May 2019
#
datacentre infrastructure
#
hyperscale
#
dc
Schneider Electric's John Powers discusses the renewable revolution that is underway and how providers can jump on board.
Hackers increasingly 'island hopping' – so what does it mean?
Tue, 14th May 2019
#
supply chain
#
cybersecurity
#
healthtech
Hackers are escalating their use of 'island hopping', targeting less secure third-party suppliers to infiltrate larger organisations' networks and wreak havoc.
How to avoid becoming a cryptojacking victim - Bitglass
Tue, 14th May 2019
#
mfa
#
crypto
#
blockchain
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Seven ways enterprises can navigate through true business transformation
Tue, 14th May 2019
#
digital transformation
#
opinion
#
it transformation
Enterprises can master true business transformation by adopting seven critical strategies, ensuring a consistent and collaborative approach to ongoing change.
Four steps to Zero Trust network security - AlgoSec
Mon, 13th May 2019
#
malware
#
firewalls
#
network infrastructure
The core principles of zero trust reflect the reality of today's complex, heterogenous enterprise network environments.
5 steps to implementing digital data center operations
Thu, 9th May 2019
#
datacentre infrastructure
#
hyperscale
#
dc
Schneider's Kevin Lemke discusses how digital data center operations increase efficiency and lower costs - and how to get there.
Paranoid Android? Examining three key trends in Android malware
Wed, 8th May 2019
#
ddos
#
wireless networks
#
cloud services
It definitely doesn't mean you are paranoid if you're worried about Android security: the threat landscape is growing in every dimension.
The evolution of chatbots
Mon, 6th May 2019
#
uc
#
martech
#
ai
It's no secret that in order to convert leads and maximise sales, companies need to connect with their prospects as quickly as possible.
Bait, hook and catch – targeted spearphishing on the rise
Fri, 3rd May 2019
#
firewalls
#
breach prevention
#
cybersecurity
Spearphishing attacks are on the rise, with cybercriminals targeting enterprises through personalised and intricate methods to steal sensitive data and funds.
Data evolution: Past, present and future
Wed, 1st May 2019
#
virtualisation
#
data analytics
#
martech
As businesses increasingly rely on data to fuel operations, the evolution from central databases to data virtualisation marks the next transformative phase.