eCommerceNews Asia - Technology news for digital commerce decision-makers

Opinion stories - Page 192

Thinkstockphotos 510691579

Around 17 million websites are already powered by WordPress - are they secure?

Thu, 20th Apr 2017
#
mfa
#
iam
#
cybersecurity
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Thinkstockphotos 660650894

Why a VPN is essential in Australia after the Metadata Retention Law

Thu, 20th Apr 2017
#
data protection
#
vpns
#
australian government
As Australia enforces metadata retention, VPNs become crucial to safeguard privacy from government surveillance, making Get a VPN Day more relevant than ever.
Thinkstockphotos 482254895

Three things companies must know about data sovereignty when moving to cloud

Wed, 19th Apr 2017
#
microsoft
#
cloud services
#
servicenow
Move out of that 1980s technology stack and into the world of the cloud – you can get there with knowledge and a trusted vendor.
Thinkstockphotos 610747426

Asian cybersecurity confidence levels take a dip

Wed, 19th Apr 2017
#
devops
#
phishing
#
email security
With nation-state cyber attacks, malware intrusions & massive data breaches every day, it is no surprise that cybersecurity is top of mind.
Thinkstockphotos 520166808 vrsgzec

The legal impact of data protection and management in the digital age

Tue, 18th Apr 2017
#
devops
#
apm
#
breach prevention
As organisations look towards data to track patterns, they should also be mindful of the legal regulations that govern data protection and breaches.
Thinkstockphotos 488253356

Zero day distributing FINSPY espionage malware and LATENTBOT malware

Tue, 18th Apr 2017
#
malware
#
breach prevention
#
cybersecurity
FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to download and execute a Visual Basic script.
Thinkstockphotos 187890557

Don't buy the elixir of youth: Machine learning is not magic

Tue, 18th Apr 2017
#
malware
#
ai
#
cybersecurity
If someone told you they had a magic elixir that would heal all your illnesses or injuries, and make you young again, would you believe them?.
Thinkstockphotos 489433130

When imitation is not the sincerest form of flattery

Thu, 13th Apr 2017
#
phishing
#
email security
#
cybersecurity
Early detection and effective intelligence is critical in today's digital world to mitigate the risks created by today's connected world.
Gettyimages 586936882

Making design thinking an 'always-on activity'

Wed, 12th Apr 2017
#
martech
#
assurity
#
opinion
When operated as a continuous routine process with your customers, design learning cycles will help inform your fundamental business strategy.
Thinkstockphotos 534455202

How to avoid that next storage hardware refresh

Tue, 11th Apr 2017
#
storage
#
virtualisation
#
converged infrastructure
Customers tell me repeatedly that they dread the phone call from their hardware storage vendor. Every three or four years, the call is predictable.
Thinkstockphotos 469918032

Strategy for cyber crime: own the routers, own the Internet

Mon, 10th Apr 2017
#
router
#
carbon black
#
opinion
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.
Thinkstockphotos 478338933

It's time to finally say goodbye to Windows XP. And Vista. Again.

Mon, 10th Apr 2017
#
malware
#
cybersecurity
#
microsoft
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.
Thinkstockphotos sb10069456i 001

Complexities & challenges with ever-changing data center landscape

Wed, 5th Apr 2017
#
hyperscale
#
dc
#
colocation
IT, data center and networking professionals are regularly faced with complexities and challenges as business and customer requirements change.
Thinkstockphotos 655596958

Don't pay for what is for free: Malicious Adobe Flash Player app found on Google Play

Wed, 5th Apr 2017
#
malware
#
martech
#
cybersecurity
F11 did not contain any harmful code. Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.
Thinkstockphotos 101359429

Malware campaign targets open source developers on GitHub

Fri, 31st Mar 2017
#
malware
#
martech
#
apm
Be on your guard if you're a developer who uses GitHub – someone could be trying to infect your computer with malware.
Thinkstockphotos 525205812

Cloud war collateral: What the rise of AWS, Azure has meant for data centers

Thu, 30th Mar 2017
#
hyperscale
#
public cloud
#
dc
Cloud titans AWS and Azure's ascent reshapes data centres, spurring unprecedented tech advances and efficiency in the race for market dominance.
Thinkstockphotos 623372694

Internet of things: From smart idea to smart reality - but is your network IoT ready?

Wed, 29th Mar 2017
#
iot
#
healthtech
#
m2m
The hype surrounding the potential of IoT shows no sign of subsiding, and now – IoT is morphing from a smart concept to reality.
Thinkstockphotos 522854602

ICIT: The Know Your Enemies 3.0 Advanced Persistent Threat Advisory is finally here

Wed, 29th Mar 2017
#
malware
#
advanced persistent threat protection
#
cybersecurity
China and Russia are by far the most active and they sponsor the most prevalent and the most sophisticated adversaries.
Thinkstockphotos 486791090

The economics of cybersecurity for the undecided

Mon, 27th Mar 2017
#
malware
#
ddos
#
phishing
It is precisely because of this concept of the cost of doing nothing that we're able to determine the value of a cybersecurity solution.
Thinkstockphotos 624569000

The business case for storage simplicity

Mon, 27th Mar 2017
#
storage
#
converged infrastructure
#
healthtech
Revolutionising IT: Firms push for simple storage systems to fuel business efficiency and slash costs in the digital cloud era.