Best Practice stories - Page 60
Why prefabricated, modular solutions are a perfect fit for edge data centers
Mon, 4th Sep 2017
#
datacentre infrastructure
#
edge computing
#
iot
The use of prefabricated, modular data center components is becoming increasingly popular for building edge data centers.
One step ahead: Safeguarding your business from the top down
Mon, 4th Sep 2017
#
breach prevention
#
ai
#
cybersecurity
Mitigation plans against cyber attacks fail due to a lack of support from the board. But if the board starts leading the charge, they will succeed.
Building a digital business platform starts with APIs - Gartner
Mon, 4th Sep 2017
#
api
#
healthtech
#
digital strategy
Gartner insights reveal APIs as crucial for digital platform success, fostering new business models and ecosystems.
Two industry heavyweights sign agreement to accelerate IIoT
Sat, 2nd Sep 2017
#
uc
#
iot
#
iiot
The memorandum of understanding will allow them to work together in their shared interests in accelerating the industrial Internet of Things (IIoT).
Hackers speak: Privileged accounts best way to steal data
Fri, 25th Aug 2017
#
endpoint protection
#
pam
#
edr
From the mouths of the hackers themselves, organisations' privileged accounts are the most attractive targets for gaining access to critical data.
Sydney: You're invited to Blancco's data erasure event
Fri, 25th Aug 2017
#
data analytics
#
martech
#
planning
An increase in the amount of data businesses must store means the risk of a data breach or cyber-attack also increases.
IoT and BYOD still putting firms in the face of danger
Thu, 24th Aug 2017
#
iot
#
byod
#
empired
As best practice security methods continue to evolve around the Internet of Things, so do the attacks on devices linked to corporate networks.
ESG finds businesses improving with cybersecurity – but still a long way to go
Fri, 4th Aug 2017
#
partner programmes
#
risk & compliance
#
cybersecurity
While CEOs and corporate boards no longer shy away from cybersecurity strategy as they once might have, there are still a number of shortcomings.
SAP and Akina Foundation bring together corporate and social enterprises to engage with community
Thu, 3rd Aug 2017
#
sap
#
social enterprise
#
akina
Working on Purpose, will be held in conjunction with Social Enterprise World Forum 2017 at Papa Hou in Christchurch on September 28.
NZ to stage international tech conference before D5 summit
Mon, 31st Jul 2017
#
nztech
#
d5
#
partners
The D5 provides a focused forum to collaborate on common projects and to support and champion our growing digital economies.
IBM X-Force takes on IoT security across connected devices - and vehicles
Wed, 26th Jul 2017
#
iot
#
ibm
#
ibm security
IBM X-Force researchers are expanding their focus to include vehicle and IoT security in response to a growing market for data connectivity in vehicles.
Google Groups users unwittingly leaking information: Change sharing settings now
Tue, 25th Jul 2017
#
google
#
proofpoint
#
redlock
Google has been the focus of two major security warnings this week, one of which exposes a major hole in Google Groups.
78% of UK data centres fail ASHRAE guidelines – is IoT the answer?
Tue, 25th Jul 2017
#
datacentre infrastructure
#
iot
#
risk & compliance
New research from thermal risk experts has revealed UK data centres are seriously lacking when it comes to temperature management.
Security expert shares tips to help SMEs fight off cyber attacks
Fri, 21st Jul 2017
#
cybersecurity
#
carbon black
#
opinion
With high-profile firms in the headlines, does it mean that SMEs face even greater risk? And if it does, what can the smaller entities do about it?.
Rittal holds first partner summit to uncover opportunities for channel market
Thu, 20th Jul 2017
#
hyperscale
#
dc
#
partner programmes
More than 40 partners from all over Europe congregated at the first Rittal Partner Summit IT to discuss challenges and opportunities in the market.
Living off the land: How malware is on the verge of becoming fileless
Thu, 20th Jul 2017
#
malware
#
cybersecurity
#
symantec
'Living off the land' may at first sound like farms and vegetable patches, but it is quickly gaining a new meaning for cyber attackers and threats.
Seven pieces of the IOT puzzle from Microsoft
Fri, 14th Jul 2017
#
uc
#
public cloud
#
iot
Microsoft unveils an expansive IOT toolkit, poised to revolutionise business, healthcare, and government operations.
Cybersecurity starts with training your employees
Wed, 12th Jul 2017
#
edutech
#
breach prevention
#
cybersecurity
At the end of an education and awareness initiative, all users should be able to understand how to identify security threats & how to respond to them.
The three Rs of enterprise security: Rotate, repave, and repair
Mon, 10th Jul 2017
#
gaming
#
advanced persistent threat protection
#
digital entertainment
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.
Four cyber security principles that withstand the test of time
Thu, 6th Jul 2017
#
endpoint protection
#
edr
#
software development
Information security can be a noisy place. As a career security guy my experiences have given me a deep understanding of attackers & the enterprise.