Quantcast
Channel: Networks Asia - IT news
Browsing all 2029 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Sophos introduces unified platform for security management

Sophos has released Sophos Central, an integrated management platform that simplifies the administration of multiple Sophos products and enables more efficient business management for Sophos...

View Article


Image may be NSFW.
Clik here to view.

Q&A: 'Legacy infrastructure is becoming increasingly irrelevant'

With the adoption of cloud services, software-as-a-service (SaaS) or on-demand, businesses do not typically run all their applications in-house anymore. There is now more emphasis on connecting to...

View Article


Image may be NSFW.
Clik here to view.

Why the 'cyber kill chain' needs an upgrade

One of the most popular models for analyzing cyberattacks doesn’t focus  enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees...

View Article

Image may be NSFW.
Clik here to view.

Microsoft reduces Windows 10 roll-back grace period

Microsoft has reduced the I-changed-my-mind period in Windows 10 by two-thirds, cutting it from 30 days to 10, the company confirmed.Users who upgraded to Windows 10 were able to roll back to the...

View Article

Image may be NSFW.
Clik here to view.

Companies expect Olympic games to strain their networks

The vast majority of companies, 85%, reported that they were likely to more closely monitor the performance of their applications and networks, including Wi-Fi, specifically because of potential strain...

View Article


Image may be NSFW.
Clik here to view.

BlackBerry launches software licensing program for mobility solutions

BlackBerry Limited has launched a software licensing program for its Mobility Solutions business by introducing the BlackBerry Hub+ for Android 6.0 Marshmallow smartphones.BlackBerry’s Mobility...

View Article

Image may be NSFW.
Clik here to view.

Hacked companies still underinvesting in security: study

Eight out of 10 executives surveyed acknowledge that their companies had been compromised by cyber attacks in the past two years, according to a new study by KPMG. Yet less than half of the 403 CIOs,...

View Article

Image may be NSFW.
Clik here to view.

Google buys Orbitera to improve its cloud app deployment services

Google has acquired Orbitera, a startup that aims to make it easier for software vendors to sell cloud-based products to businesses. The startup gives software vendors a suite of tools for deploying...

View Article


Image may be NSFW.
Clik here to view.

Bangkok Airways uses Oracle cloud to take customer service to new heights

Bangkok Airways has gone live with Oracle Service Cloud to power customer experience and customer engagement. The cloud service took only six weeks to go live. This is the first airline deployment of...

View Article


Image may be NSFW.
Clik here to view.

Delta, Southwest computer outages highlight importance of IT

Delta Airlines' announcement Monday morning that a power outage in Atlanta caused a global computer outage, leading to significant numbers of flight cancellations and delays, provides the most recent...

View Article

Image may be NSFW.
Clik here to view.

Intel snaps up Nervana for a crash course on deep learning

Intel is buying deep-learning startup Nervana Systems in a deal that could help it make up for lost ground in the increasingly hot area of artificial intelligence.Founded in 2014, California-based...

View Article

Image may be NSFW.
Clik here to view.

SolarWinds DPA now supports MySQL database repositories

SolarWinds has announced significant updates to its SolarWinds Database Performance Analyzer (DPA). With the enhancements, SolarWinds DPA is  now capable of providing Multi-Dimensional Performance...

View Article

Image may be NSFW.
Clik here to view.

There's never a shortage of security holes

Information security is a job that can never be completed. Threats multiply, and new vectors of attack become apparent. A couple of new ones were publicized in last week.For starters, internet security...

View Article


Image may be NSFW.
Clik here to view.

Census outage was caused by DoS attacks, says Australian statistics agency

The Australian Bureau of Statistics (ABS) has blamed Denial of Service attacks originating from overseas for the outage which hit the census website last night. But security experts have expressed...

View Article

Image may be NSFW.
Clik here to view.

Microservices, Java-on-Java top Oracle’s JVM design goals

Oracle's plans for the Java Virtual Machine include greater language support, as well as accommodations for microservices and a heavier reliance on Java programming itself."We want a VM that will...

View Article


Image may be NSFW.
Clik here to view.

New ransomware tactics emerging to maximize profit, says Cisco report

So far in 2016, ransomware has become the most profitable malware type in history, according to  the Cisco 2016 Midyear Cybersecurity Report (MCR). Cisco expects to see this trend continue with even...

View Article

Image may be NSFW.
Clik here to view.

RSA announces new threat detection and response solution

RSA, The Security Division of EMC has unveiled the RSA NetWitness Suite, an advanced threat detection and response solution that helps security teams detect and understand the full scope of a...

View Article


Image may be NSFW.
Clik here to view.

A conversation with a white hat hacker

White hat hackers see companies at their worst.  It is, after all, their job to expose weaknesses. We recently spoke with penetration testing expert Josh Berry, Senior Technology Manager at Accudata...

View Article

Image may be NSFW.
Clik here to view.

When it comes to data privacy, S'pore ranks as the safest Asian nation

Only four Asian nations are considered truly secure for data storage, according to a new report by secure data centre Artmotion. Combining independent data from the United Nations, World Economic...

View Article

Image may be NSFW.
Clik here to view.

INFOGRAPHIC: From carjacking to car hacking: The real danger of cyber attacks...

next-gencars.pngThese days, a crook does not need a gun or a crowbar to steal a car. With some technical know how and an internet connection, a thief could unlock a car, or even disable its engine....

View Article
Browsing all 2029 articles
Browse latest View live