IT Brief UK - Technology news for CIOs & IT decision-makers

Laptops stories - Page 24

Thinkstockphotos 152946044

Why a secure perimeter is no longer enough protection for your IT infrastructure

Mon, 12th Mar 2018
#
mfa
#
mdm
#
iam
Digital identity is used as the key method of protecting digital assets regardless of their location or how they are being accessed.
Fallback

Learn how to bring data to life anywhere, anytime

Mon, 26th Feb 2018
#
martech
#
online courses
#
mobility
Even if you have no previous experience with the programme, you can join the course as Dan starts you off from the very basics.
Screen shot 2018 02 08 at 1

Expert opinion: Three simple ways to prevent data loss

Fri, 9th Feb 2018
#
encryption
#
dlp
#
breach prevention
IBM estimates the cost of a data breach is $3.62m, highlighting the importance of encryption - COMPAREX UK's expert on the matter provides his advice.
Intel 2018 ces 4

Intel CEO addresses Spectre and Meltdown bugs at CES keynote

Wed, 10th Jan 2018
#
semiconductors
#
intel
#
spectre
Kraznich advised users to apply any updates from your operating system vendor and system manufacturer as soon as they become available.
Security breach

Intel processor vulnerabilities: What you need to know about Meltdown and Spectre

Mon, 8th Jan 2018
#
semiconductors
#
microsoft
#
google
Desktops, laptops, and smartphones running on vulnerable processors can be exposed to unauthorized access and information theft.
Pexels photo 196656

IDC names VMware leader in enterprise mobility management

Thu, 14th Dec 2017
#
virtualisation
#
iot
#
it automation
An industry-leading UEM solution, high-profile customer deployments and IoT-focused solutions and partnerships solidify VMware's position as a leader.
Thinkstockphotos 654899904 rrq85tr

Working through the holiday season? Four ways to keep your mobile device secure

Wed, 13th Dec 2017
#
endpoint protection
#
edr
#
wireless networks
As the holiday season begins, Ixia warns that remote workers must not overlook mobile device security to avoid cyber threats.
Thinkstockphotos 79314568

Layered security: Making it harder for the bad guys to win

Thu, 7th Dec 2017
#
malware
#
ddos
#
ransomware
While locking every door may seem obvious, making it harder for cybercriminals to physically get in should be stage one of a layered security program.
Screen shot 2017 11 13 at 10

Enterprise mobility management market more competitive than ever

Mon, 13th Nov 2017
#
virtualisation
#
daas
#
it automation
EMM platforms have evolved from being just tactical device management tools, with the market more competitive than ever. So who's leading the race?.
Thinkstockphotos 683716096

Commvault drops 3 new data recovery services especially for laptops - Commvault GO 2017

Wed, 8th Nov 2017
#
saas
#
data protection
#
dr
Commvault unveils three bespoke laptop data recovery services at GO 2017, addressing rampant data loss and compliance needs.
Lightbulb people drawing

Expert says effective IT security starts with effective training

Tue, 7th Nov 2017
#
malware
#
cybersecurity
#
education, learning & training
Tony Glass, GM & VP EMEA at Skillsoft, discusses why effective training holds the key to robust IT security in a challenging business environment.
Thinkstockphotos 840534924

Exclusive: ESET on why the humble password is here to stay

Mon, 30th Oct 2017
#
malware
#
biometrics
#
mfa
ESET's Nick FitzGerald discusses the enduring relevance of passwords, advocating for long, memorable phrases to enhance security without regular changes.
Thinkstockphotos 674457502

Experts weigh in on 'Bad Rabbit', the potential next WannaCry​

Thu, 26th Oct 2017
#
malware
#
firewalls
#
network infrastructure
Ever heard of Bad Rabbit? It's the newest form of ransomware causing havoc in Eastern Europe that could be coming your way soon.
Thinkstockphotos 624010236

Interview: The Aussie security firm fighting cyber deception from the inside out

Thu, 19th Oct 2017
#
quantum computing
#
breach prevention
#
ai
Penten's Matthew Wilson speaks about advances in cyber deception and the growing importance of protecting information from hacks.
Fallback

Are connected devices leaving you vulnerable to security breaches?

Thu, 19th Oct 2017
#
firewalls
#
network security
#
iot
With Gartner forecasting 50 billion connected devices by 2020, it's important for devices to be secured, or they could represent a threat.
Thinkstockphotos 629776586

eCommerce apps - Worth the expense or a waste of time?

Mon, 16th Oct 2017
#
martech
#
commerce systems
#
online shopping
The eCommerce market in South Africa will amount to US$2.7 billion in 2017 with an annual expected growth rate of 14.2%.
Screen shot 2017 10 16 at 2

The internet of security things: Protecting data with a mobile workforce

Mon, 16th Oct 2017
#
daas
#
mdm
#
iot
IGEL's Jeff Kalberg outlines 5 technical developments aimed at improving mobile data security and endpoint experiences resellers and MSPs can harness.
Thinkstockphotos 801127526 3fpxdde

Dell plans $14m donation: “It's our responsibility to prepare the next generation”

Fri, 13th Oct 2017
#
network infrastructure
#
dei
#
solar power
By encouraging youth regardless of gender, ethnicity or social class to study STEM, there's an opportunity to bring in different perspectives.
Space x

HPE's Spaceborne computer successfully powers up in space

Thu, 21st Sep 2017
#
spacetech
#
hpe
#
opinion
One month after being launched into space, SpaceX's Spaceborne Computer is successfully powered on, achieving one teraFLOP.
Thinkstockphotos 178710046

Why IT security is a critical part of every learning environment

Mon, 11th Sep 2017
#
edutech
#
firewalls
#
network infrastructure
Many educational institutions lack a plan to manage the security risks posed by the hundreds of devices connected to their networks, according to Wavelink.