Opinion stories - Page 190
Meeting the challenges of big data in the modern data centre
Tue, 6th Jun 2017
#
data analytics
#
hyperscale
#
martech
We're in the midst of a communications revolution where enterprise data centre networks must keep pace with ever increasing capacity demands.
Security - It really is all or nothing if you want to know the enemy
Tue, 6th Jun 2017
#
ddos
#
supply chain
#
cybersecurity
Cybersecurity spending is set to reach $90bn in 2017 as businesses shift focus to detection and response capabilities.
AT&T MD for ANZ: 'Take advantage of SDN and NFV to be more responsive in Asia'
Mon, 5th Jun 2017
#
ddos
#
network infrastructure
#
sdn
AT&T managing director for ANZ talks about how businesses can compete with speed and efficiency in fast-changing Asia.
The virtualisation architect: Top 6 must-haves of the modern data centre
Thu, 1st Jun 2017
#
storage
#
virtualisation
#
hyperscale
Australian organisations are starting to find that most legacy architectures can't support growing demands of speed, scale, and agility.
Join the data revolution - How banks can change with the times
Tue, 30th May 2017
#
data analytics
#
martech
#
planning
Banks face a modern quandary: adapt to the data revolution or be left behind, with Standard Chartered leading the charge.
The three types of employees that can cause a data breach
Mon, 29th May 2017
#
malware
#
edutech
#
breach prevention
More and more companies are realizing that trusted & trained employees can also pose an enormous threat. We have identified three types of employees.
Gemalto's perspective: Hacking for the greater good
Mon, 29th May 2017
#
malware
#
cybersecurity
#
gemalto
Ethical hackers are now one of the most important and effective tools at strengthening collective security and making the cyber landscape safe.
Silver Peak on how SD-WAN makes regional hubs a reality
Fri, 26th May 2017
#
saas
#
network infrastructure
#
sd-wan
Debate has raged on for decades over WAN architecture. Hub-and-spoke or fully distributed mesh, which is better?.
Gartner asks: Do you have a ticking time-bomb in your network?
Thu, 25th May 2017
#
hyperscale
#
dc
#
colocation
A growing number of network and security vendors have said that some product lines have an increasing likelihood of total system failure.
WannaCry shines spotlight on data privacy and compliance regulations
Thu, 25th May 2017
#
risk & compliance
#
carbon black
#
opinion
In the case of a ransomware attack, the liability and consequences to victims can often stretch far beyond the results of lost data.
Big data: How companies can learn to swim in the data lake
Wed, 24th May 2017
#
crm
#
data analytics
#
martech
Information is pouring into companies faster, so businesses are drowning in a flood so great it has become known as the 'data lake'.
What to tell the board about the blockchain – Gartner
Tue, 23rd May 2017
#
blockchain
#
risk & compliance
#
opinion
How to tell the board about a technology that could disrupt business models, remove institutional arbiters, and reprogramme the economy.
Digital Shadows on Wannacry: An analysis of competing hypotheses
Mon, 22nd May 2017
#
malware
#
ransomware
#
cybersecurity
Digital Shadows probes the enigma of WannaCry's origins, weighing cybercriminal mischief against nation-state subterfuge.
Avoiding pitfalls in IoT integration - Gartner
Mon, 22nd May 2017
#
iot
#
api
#
opinion
Benoit Lheureux outlines five steps for integration leaders to address some of the most common challenges in IoT integration.
Building Blocks: Why installation practices make or break your data center
Fri, 19th May 2017
#
fibre
#
cable
#
opinion
Take a look at a couple of guidelines to follow during cable installation, which will help ensure success and save time in the post-installation.
Apple users advised to update their software now, as new security patches released
Wed, 17th May 2017
#
ios
#
apple
#
opinion
Welcome to the post-WannaCryptor world, where every computer user understands the importance of creating secure backups and applying security patches.
A short history of the computer password
Mon, 15th May 2017
#
malware
#
cybersecurity
#
passwords
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.
How to protect your organisation from WannaCry ransomware
Mon, 15th May 2017
#
malware
#
ransomware
#
ai security
Defend against the global WannaCry threat with robust cybersecurity measures and constant vigilance, says Carbon Black's team.
Big changes in the infosec landscape: Time to take note and take action
Mon, 15th May 2017
#
malware
#
breach prevention
#
cybersecurity
Do you like RDP? Good. So do attackers. Wait? What?! Yes, attackers love your weakly-defended RDP port as the payoff can be huge.
Future proofing solutions – what are we looking for in Hybrid Cloud Analytics?
Mon, 15th May 2017
#
hybrid cloud
#
data analytics
#
martech
The move towards hybrid vehicles and sports equipment has now extended to watches, but what exactly is hybrid cloud analytics?.