Tablets stories - Page 21
Equinix: Is GDPR overhyped?
Fri, 25th May 2018
#
ddos
#
data analytics
#
hyperscale
As GDPR's May 25th debut causes anxiety about compliance, Equinix asserts its vital role in aiding firms navigate the new data protection landscape.
Clear security guidelines needed to protect Australia's digital health records
Tue, 22nd May 2018
#
malware
#
ransomware
#
breach prevention
Digital health records in Australia promise improved healthcare, but with a third of data breaches involving health info, clear security guidelines are crucial.
Electronic lock vulnerabilities can lead attackers directly to your hotel room
Mon, 30th Apr 2018
#
physical security
#
cybersecurity
#
f-secure
Next time you stay at a hotel as part of a business or personal trip, you may want to ask if the hotel's locking systems are up-to-date.
Why mandating strong cybersecurity for your remote workforce matters
Mon, 30th Apr 2018
#
malware
#
firewalls
#
network infrastructure
Employees who use unprotected public or home internet connections are putting their organisation, networks, assets, and intellectual property at risk.
Having the right connections: Are VPNs really fit for purpose?
Thu, 26th Apr 2018
#
vpns
#
cybersecurity
#
onelogin
Stuart Sharp says with remote working fast becoming commonplace in today's business landscape, IT teams are being faced with a security conundrum.
Anatomy of an outage: Understanding the lifecycle of downtime
Thu, 19th Apr 2018
#
dr
#
cloud services
#
business continuity
Businesses face high costs and risks with outages, impacting operations and reputation; understanding all stages is key.
Data centres in outer space could happen sooner than you think
Thu, 29th Mar 2018
#
spacetech
#
semiconductors
#
hyperscale
An expert has stated that we could soon be launching data centres into outer space to utilise solar power & zero human error, among other things.
Q&A: Darktrace explains how AI influences cybersecurity
Tue, 27th Mar 2018
#
supply chain
#
ai security
#
ai
Darktrace delves into AI's transformative impact on cybersecurity, elucidating how it handles sophisticated threats and anticipates future advancements.
Why a secure perimeter is no longer enough protection for your IT infrastructure
Mon, 12th Mar 2018
#
mfa
#
mdm
#
iam
Digital identity is used as the key method of protecting digital assets regardless of their location or how they are being accessed.
Learn how to bring data to life anywhere, anytime
Mon, 26th Feb 2018
#
martech
#
online courses
#
mobility
Even if you have no previous experience with the programme, you can join the course as Dan starts you off from the very basics.
Expert opinion: Three simple ways to prevent data loss
Fri, 9th Feb 2018
#
encryption
#
dlp
#
breach prevention
IBM estimates the cost of a data breach is $3.62m, highlighting the importance of encryption - COMPAREX UK's expert on the matter provides his advice.
Intel CEO addresses Spectre and Meltdown bugs at CES keynote
Wed, 10th Jan 2018
#
semiconductors
#
intel
#
spectre
Kraznich advised users to apply any updates from your operating system vendor and system manufacturer as soon as they become available.
Intel processor vulnerabilities: What you need to know about Meltdown and Spectre
Mon, 8th Jan 2018
#
semiconductors
#
microsoft
#
google
Desktops, laptops, and smartphones running on vulnerable processors can be exposed to unauthorized access and information theft.
IDC names VMware leader in enterprise mobility management
Thu, 14th Dec 2017
#
virtualisation
#
iot
#
it automation
An industry-leading UEM solution, high-profile customer deployments and IoT-focused solutions and partnerships solidify VMware's position as a leader.
Working through the holiday season? Four ways to keep your mobile device secure
Wed, 13th Dec 2017
#
endpoint protection
#
edr
#
wireless networks
As the holiday season begins, Ixia warns that remote workers must not overlook mobile device security to avoid cyber threats.
Layered security: Making it harder for the bad guys to win
Thu, 7th Dec 2017
#
malware
#
ddos
#
ransomware
While locking every door may seem obvious, making it harder for cybercriminals to physically get in should be stage one of a layered security program.
Enterprise mobility management market more competitive than ever
Mon, 13th Nov 2017
#
virtualisation
#
daas
#
it automation
EMM platforms have evolved from being just tactical device management tools, with the market more competitive than ever. So who's leading the race?.
Commvault drops 3 new data recovery services especially for laptops - Commvault GO 2017
Wed, 8th Nov 2017
#
saas
#
data protection
#
dr
Commvault unveils three bespoke laptop data recovery services at GO 2017, addressing rampant data loss and compliance needs.
Expert says effective IT security starts with effective training
Tue, 7th Nov 2017
#
malware
#
cybersecurity
#
education, learning & training
Tony Glass, GM & VP EMEA at Skillsoft, discusses why effective training holds the key to robust IT security in a challenging business environment.
Exclusive: ESET on why the humble password is here to stay
Mon, 30th Oct 2017
#
malware
#
biometrics
#
mfa
ESET's Nick FitzGerald discusses the enduring relevance of passwords, advocating for long, memorable phrases to enhance security without regular changes.