Opinion stories - Page 196
Why combining technology with standards could combat fraud
Wed, 14th Dec 2016
#
malware
#
cybersecurity
#
software development
Fraud is still on the increase due to the use of new technologies, causing losses to both users and companies. What is being done to avoid this?.
Why service providers should care about customer security
Wed, 14th Dec 2016
#
partner programmes
#
cybersecurity
#
healthtech
Ransomware's rise demands vigilance from service providers, as the security of customer data is not just ethical, but now a critical business must.
Smartphones are becoming key controllers of our lives
Mon, 12th Dec 2016
#
surveillance
#
iot
#
payment technologies
We can unlock our homes, disable our security system & turn the lights on using our smartphones. Useful, but it also gives rise to security concerns.
SD-WAN: Why you need one and what you need to know
Mon, 12th Dec 2016
#
virtualisation
#
network infrastructure
#
sd-wan
SD-WAN technology is maturing rapidly to enable much-needed network flexibility. The challenge for IT decision-makers is understanding the options.
AWS reinvents its portfolio to capture greater IoT business
Mon, 12th Dec 2016
#
hyperscale
#
public cloud
#
microsoft
AWS is reinventing its Internet of Things (IoT) suite and addressing numerous shortcomings, with a one-year anniversary build-out of a suite of IoT.
When antivirus fails, here's how to choose next-gen antivirus
Mon, 12th Dec 2016
#
malware
#
endpoint protection
#
edr
The ineffectiveness of traditional antivirus , which catches less than half of noteworthy malicious events, is causing untold damage to organisations.
If storage were invented today, here's what it would look like
Wed, 7th Dec 2016
#
storage
#
hyperscale
#
public cloud
Let us picture the ideal storage platform if the technology were invented today, without limitations, pre-conceived ideas or restrictions.
Gartner on the challenges of artificial intelligence
Wed, 7th Dec 2016
#
data analytics
#
martech
#
planning
If you don't own the data or rights to that data, no amount of fancy algorithm or application will win. You need access to the vastness & variety.
Android ransomware spreads further, with new methods in its toolbox
Tue, 6th Dec 2016
#
malware
#
ransomware
#
cybersecurity
New Android ransomware tactics emerge, using encrypted payloads and email scams to exploit users, with a new focus on Chinese markets.
HPE's first anniversary brings declining revenues amid heavy market disruption
Tue, 6th Dec 2016
#
storage
#
supply chain
#
software development
Hewlett Packard Enterprise (HPE) reported a 7% decline in revenue during Q3 2016, but saw operating margin rise to 6.2%.
Oracle plans to get more out of NetSuite
Tue, 6th Dec 2016
#
fintech
#
iaas
#
financial systems
Oracle has completed its tender offer for NetSuite and has announced plans to leverage its resources to globalize the mid-market enterprise.
Siemens-branded CCTV webcams require urgent firmware patch
Thu, 1st Dec 2016
#
ddos
#
surveillance
#
healthtech
Siemens-branded IP-based CCTV cameras are the latest internet-connected devices to be found vulnerable to hacking attacks.
Cybersecurity checklist: Five essential tasks for multinational companies in 2017
Mon, 28th Nov 2016
#
ddos
#
cybersecurity
#
at&t
While 2016 brought to light a number of massive data breaches, we have to be ready for more highly sophisticated and rapid attacks in 2017.
What the big Eftpos switch means for consumers
Mon, 28th Nov 2016
#
martech
#
commerce systems
#
payment technologies
New Zealand's biggest technology 'switch-over' since the demise of analogue TV is on its way, and the change is good news for consumers.
BT: It's not just cyber criminals who will compromise your valuable data
Mon, 28th Nov 2016
#
breach prevention
#
cybersecurity
#
data breach
Human error emerges as the key player behind data breaches, as BT unveils 60% are employee mishaps, not cybercrime.
How to Speak Like a Data Center Geek: Internet of Things
Thu, 24th Nov 2016
#
hyperscale
#
iot
#
dc
The things in the Internet of Things are more narrowly defined, but what they share are connections to the Internet and each other via M2M technology.
Why China's new cybersecurity law is a threat to international businesses and innovation
Wed, 23rd Nov 2016
#
payment technologies
#
cybersecurity
#
law
Under the veil of cybersecurity, regulators will have access to information that could benefit Chinese firms at the expense of foreign business.
Software vulnerability management: How 'intelligence' helps reduce the attack surface
Tue, 22nd Nov 2016
#
flexera
#
opinion
While CSOs probably don't need to be reminded of the extensive damage that can be inflicted through vulnerabilities, the numbers speak for themselves.
Aus Gov gets serious about late payments, launches national inquiry
Mon, 21st Nov 2016
#
martech
#
commerce systems
#
payment technologies
The Small Business and Family Enterprise Ombudsman, Kate Carnell, has launched an inquiry into the late payment of small businesses.
Secure your router: How to help prevent the next internet takedown
Wed, 16th Nov 2016
#
ddos
#
cybersecurity
#
router
Someone recently asked me if we shouldn't adopt a new name for the Internet of Things (IoT) because the existing term is too vague.