IT Brief UK - Technology news for CIOs & IT decision-makers

Best Practice stories - Page 64

Bombs

Service providers a weak link in cybersecurity

Tue, 26th Apr 2016
#
uc
#
risk & compliance
#
cybersecurity
Businesses that allow their service providers to access sensitive data are at risk of a cyberattack, warns consulting firm Protiviti.
Cyber threat

Aussie Government urges business to take action against cyber threats

Thu, 21st Apr 2016
#
cybersecurity
#
deloitte
#
cyber criminal
Australian businesses are falling behind in cyber security, leaving them vulnerable to cyber criminals, according to Deloitte.
Sec

Governments vulnerable to attack, says Palo Alto Networks

Wed, 20th Apr 2016
#
firewalls
#
network infrastructure
#
network security
Government departments are an attractive target for malicious hackers and criminals, making them vulnerable to attack.
Fs thailand awards

TCC Technology named top Thai data center hosting service provider

Fri, 15th Apr 2016
#
hyperscale
#
dc
#
tss technology
Thailand's TCC Technology has been named Frost & Sullivan's Thailand Data Center Hosting Service Provider of the Year.
Cyber crim

Watch out, there's a new breed of cyber criminal in town

Tue, 12th Apr 2016
#
uc
#
breach prevention
#
symantec
A new class of professional cyber criminals has emerged, adopting corporate practices to increase the efficiency of their attacks.
Lock

Axis teams up with Avaya, EMC and Genetec to complete industry first

Tue, 12th Apr 2016
#
surveillance
#
digital entertainment
#
cybersecurity
Axis forges a cutting-edge security alliance, offering the first validated surveillance platform with Avaya, EMC and Genetec to bolster cyber defences.
Kids shocked laptop

Existing security best-practice can handle IoT exposures? Not really

Tue, 12th Apr 2016
#
iot
#
cybersecurity
#
opinion
There is a belief that IoT security exposures can be taken care of with existing IT-centric security practices. Earl Perkins disagrees.
Students ipad

From SAMR to signage

Wed, 23rd Mar 2016
#
digital signage
#
trilbytv
#
pro av
UK schools miss the mark in using digital signage, with ineffective content and heavy IT systems hampering educational outcomes.
Cloud dr

Cloud disaster recovery confidence up, but challenges remain

Wed, 9th Mar 2016
#
dr
#
private cloud
#
hyperscale
Confidence in cloud-based disaster recovery is growing, but risks, outages and downtime costs are still posing challenges for enterprises.
Offering

SimpliVity rolls out new support tiers and offerings

Tue, 1st Mar 2016
#
converged infrastructure
#
support
#
simplivity
SimpliVity launches new support tiers and services for enterprise applications, including its new proactive support service, OmniWatch.
Tick

Two Kiwis recognised for cyber resilience work on global stage

Fri, 26th Feb 2016
#
risk & compliance
#
cybersecurity
#
risk management
Marsh brokers become first New Zealanders to receive cyber resilience accreditation from AXELOS. #cybersecurity.
Data analytics tablet

Data and analytic topics on the minds of CIOs

Thu, 25th Feb 2016
#
opinion
#
analyst report
#
information governance
I had the good fortune to be present (and presenting) at our US CIO Leadership Forum in Phoenix, Arizona this week.
Access

Tracking privileged access vital, says Gartner

Mon, 15th Feb 2016
#
pam
#
analyst report
#
research director
Unless organisations track and review privileged activity, they risk being blindsided by insider threats and errors that cause significant outages.
Hacker

Hackers exploit wireless networks, steal valuable information

Thu, 28th Jan 2016
#
wireless networks
#
cloud services
#
hackers
Wireless networks are vulnerable, but steps can be taken to protect against attacks, says Netscout's Fluke Networks Enterprise Solutions.
Fingerprint

Demand for secure identity solutions grows

Tue, 19th Jan 2016
#
uc
#
wearables
#
cybersecurity
Key trends including ongoing advancements in privacy protection and a more mobile and connected experience will have a big impact on secure identities.
1

Businesses facing serious risk from haphazard PAM

Mon, 16th Nov 2015
#
network infrastructure
#
pam
#
apm
Haphazard privileged account management is exposing businesses to serious risk according to a new survey from Dell.
Thales

Cyber security firm releases remote admin capabilities

Wed, 28th Oct 2015
#
cybersecurity
#
thales
#
best practice
Thales uproots traditional HSM management, launching nifty remote admin features targeting data centres and cloud migrations.
Iot security

Enterprise IoT devices underestimated and under-secured

Fri, 16th Oct 2015
#
iot
#
risk & compliance
#
cybersecurity
Alarm over IoT security gap: IT experts claim devices in homes and business are under-protected, despite consumer confidence.
Iphone6s header

Top tips to secure your new iPhone

Mon, 5th Oct 2015
#
apple
#
symantec
#
apple iphone
Protect your iPhone investment - Key steps to assure your data and device remain secure as iPhone mania grips Apple enthusiasts.
Cyber attack

Organisations unprepared for the greatest security risks, survey finds

Fri, 2nd Oct 2015
#
breach prevention
#
cyberark
#
cyber attacks
Cyber attackers posing as legitimate insiders represent the greatest security risks to organisations, according to a new survey by CyberArk.