ChannelLife UK - Industry insider news for technology resellers

Opinion stories - Page 105

Cybersecurity29 copy

Who is really responsible for cloud security?

Wed, 3rd Jul 2019
#
saas
#
firewalls
#
network infrastructure
Experts at the NetEvents EMEA Press Spotlight emphasised the critical need for enterprises to understand the Shared Responsibility Model in cloud security.
Data security

How to stop your data from getting hijacked - SolarWinds

Wed, 3rd Jul 2019
#
data protection
#
solarwinds
#
opinion
Organisations often struggle to avoid man-in-the-middle attacks because hackers target infrastructure the organisation has almost no control over.
Flux result 44b7dc25 b707 4d27 867e 62b6fd1e234b

TechDay expansion continues with new CFOtech sites

Thu, 20th Jun 2019
#
data analytics
#
digital transformation
#
fintech
TechDay debuts CFOtech, a fresh site trio for finance chiefs in Asia-Pacific, sparking tech-savvy business evolution.
Credit card fraud

Meeting the card payment industry's compliance requirements - Kemp

Tue, 18th Jun 2019
#
ddos
#
risk & compliance
#
credit card fraud
eCommerce fraud boom leads to a surge in CNP crime, spotlighting vital PCI-DSS compliance and advanced security tech.
Dsc 6910

The evolution of data centres to accommodate edge computing

Mon, 10th Jun 2019
#
edge computing
#
data center on demand
#
opinion
Data centres are evolving to meet the demands of edge computing in 2019, driven by AI and IoT, facilitating faster, localised decision-making.
Gettyimages 1010836174

How Agile will expose your decision-making effectiveness

Thu, 30th May 2019
#
devops
#
apm
#
software development
Adopting Agile methodologies is not enough; decision-making speed and quality hinge on leveraging artificial intelligence, McKinsey reports.
Gettyimages 940476300

Look before you leap: Making a name for yourself as a tech startup

Mon, 27th May 2019
#
physical security
#
branding
#
intellectual property
For tech startups, the necessity of brand protection is too often thrown in the 'too hard' or 'too expensive' basket or simply overlooked.
Gettyimages 878178866

The impact of bringing biometrics to the door

Wed, 22nd May 2019
#
biometrics
#
opinion
#
hid global
Biometrics, such as fingerprint authentication, are being adopted by enterprises to improve security and convenience.
Gettyimages 954305374

Exploring the different needs for cloud services across Europe

Wed, 22nd May 2019
#
cloud security
#
multi-cloud
#
cloud marketplace
Although digital transformation is happening across Europe, each country continues to have its own IT needs and the different cloud markets highlight this.
Gettyimages 945200518

Forget endpoints—it's time to secure people instead

Thu, 16th May 2019
#
malware
#
wireless networks
#
zero trust security
Security paradigms need a shift; as mobile work ensues, companies must pivot from endpoint protection to securing the actual users.
Gettyimages 936999506

3 ways cloud & colocation providers can use renewables

Wed, 15th May 2019
#
datacentre infrastructure
#
hyperscale
#
dc
Schneider Electric's John Powers discusses the renewable revolution that is underway and how providers can jump on board.
Gettyimages 472155788

Hackers increasingly 'island hopping' – so what does it mean?

Tue, 14th May 2019
#
supply chain
#
cybersecurity
#
healthtech
Hackers are escalating their use of 'island hopping', targeting less secure third-party suppliers to infiltrate larger organisations' networks and wreak havoc.
Cryptojacking2

How to avoid becoming a cryptojacking victim - Bitglass

Tue, 14th May 2019
#
mfa
#
crypto
#
blockchain
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Gettyimages 983707350

Seven ways enterprises can navigate through true business transformation

Tue, 14th May 2019
#
digital transformation
#
opinion
#
it transformation
Enterprises can master true business transformation by adopting seven critical strategies, ensuring a consistent and collaborative approach to ongoing change.
Cybersecurity23

Four steps to Zero Trust network security - AlgoSec

Mon, 13th May 2019
#
malware
#
firewalls
#
network infrastructure
The core principles of zero trust reflect the reality of today's complex, heterogenous enterprise network environments.
Screen shot 2019 05 09 at 12

5 steps to implementing digital data center operations

Thu, 9th May 2019
#
datacentre infrastructure
#
hyperscale
#
dc
Schneider's Kevin Lemke discusses how digital data center operations increase efficiency and lower costs - and how to get there.
Gettyimages 924724474

Paranoid Android? Examining three key trends in Android malware

Wed, 8th May 2019
#
ddos
#
wireless networks
#
cloud services
It definitely doesn't mean you are paranoid if you're worried about Android security:  the threat landscape is growing in every dimension.
Chattingoptimised

The evolution of chatbots

Mon, 6th May 2019
#
uc
#
martech
#
ai
It's no secret that in order to convert leads and maximise sales, companies need to connect with their prospects as quickly as possible.
Credential stuffing

Bait, hook and catch – targeted spearphishing on the rise

Fri, 3rd May 2019
#
firewalls
#
breach prevention
#
cybersecurity
Spearphishing attacks are on the rise, with cybercriminals targeting enterprises through personalised and intricate methods to steal sensitive data and funds.
Gettyimages 994778056

Data evolution: Past, present and future

Wed, 1st May 2019
#
virtualisation
#
data analytics
#
martech
As businesses increasingly rely on data to fuel operations, the evolution from central databases to data virtualisation marks the next transformative phase.