An uncompromising approach to staying ahead of advanced threats
Recently, hundreds of millions of MySpace, Tumblr and LinkedIn account details that were stolen several years ago were advertised for sale online. Although the login details may not have been used for...
View ArticleMotorola's radio system to help New Zealand firefighters save lives
Firefighters serving with New Zealand Fire Service will benefit from improved safety and communication while working in fire grounds through an innovative two-way radio solution.The new solution from...
View ArticleAttackers could abuse DNSSEC-secured domains for DDoS attacks: report
A majority or 80% of DNSSEC-secured domains could be used to amplify distributed denial of service (DDoS) attacks, at an average factor of 28.9 times, according to a recent report by Neustar which...
View ArticleDropsuite rolls out Microsoft Office 365 Email Backup & Archiving product
Dropsuite is taking aim at the more than 60 million Microsoft Office 365 users with the roll out of the Microsoft Office 365 (O365) Email Backup & Archiving that offers reseller partners...
View ArticleAWS, Google, Equinix recognized as key data center players
Amazon Web Services (AWS), Google, Equinix, Digital Realty, and Microsoft have been recognized as key players of the global data center market by the new “Global Data Center Market 2016-2020”...
View ArticleForcepoint's SureView Insider Threat now available in S'pore
Forcepoint’s SureView Insider Threat, a security tool that helps companies prevent data theft and loss from hijacked systems, rogue insiders, stolen credentials and negligent end users is now available...
View ArticleDeath to copper cables: Intel turns to light for fast data transfers
Intel believes the days of using copper wires for data transfers, both between computers and inside of them, are numbered because optical communications are on the horizon.The chipmaker has started...
View ArticleHEI Hotels cyberattack could have been avoided, says security expert
HEI Hotels & Resorts recently reported a possible compromise of payment card information at its point-of-sale terminals.The company, which manages close to 60 Starwood, Hilton, Marriott, Hyatt and...
View ArticleFirms pay up to 200% premium on recovery costs due to security talent shortage
Companies that struggle to recruit sufficiently skilled IT security professionals end up paying up to three times more to recover from a cybersecurity incident, according to a recent report prepared by...
View ArticleParallels Desktop 12 for Mac launched
Parallels, creator of software for running Windows applications on a Mac, has launched Parallels Desktop 12 for Mac. Parallels Desktop 12 is macOS Sierra ready, includes up-to 25 percent performance...
View ArticleGoogle is killing Chrome apps on Mac, Windows and Linux
Three years after introducing special apps that run inside the Chrome browser, Google announced Friday that it will be removing them from Windows, Mac and Linux by early 2018. Google introduced those...
View ArticleWhy it's time to rethink your Facebook page strategy
Marketers still spending digital ad dollars or otherwise promoting their Facebook pages to secure more likes or follows may want to take a step back and rethink their strategy.Facebook this week...
View ArticleInstagram Business Tools rolls out Southeast Asia
Instagram Business Tools has rolled out in Southeast Asia countries of Singapore, Indonesia, Philippines, Thailand and Vietnam, at around the same time as a global launch in the United States,...
View ArticleDo HK enterprises care about cloud-based disaster recovery?
Hong Kong has just survived (yet again) another major typhoon without suffering from any damage to its data center, network infrastructure or power supply facilities. Given the relatively secured data...
View ArticleNutanix software now runs on Cisco UCS
Driven by strong demand from Cisco customers, Nutanix has independently validated CiscoUnified Computing System (UCS) C-Series servers to run its Enterprise Cloud Platformsoftware. Nutanix software has...
View ArticleINFOGRAPHIC | The No. 1 Cause of Insider Threats
forcepoint-inofgraphic.jpgAll workplace share the same security threat: the well meaning but careless employee who may be more focused on productivity than protecting the company’s sensitive or...
View ArticleAMD achieves 40% improved performance with Zen chip
AMD recently demonstrated the performance of its next-generation, high-performance “Zen” processor core. The new “Zen” core achieved a 40% generational improvement in instructions per clock,...
View ArticleAnd the world's top smart cities are...
According to Frost & Sullivan, the global Smart Cities market is projected to reach US$1.56 trillion by 2020. With rapid urbanization and ageing populations, cities are facing increasing strain on...
View ArticleBlockchain technology tested for digitalization of checks in Singapore
Hitachi, Ltd. and the Bank of Tokyo-Mitsubishi UFJ, Ltd. (BTMU) have announced that they have started Proof of Concept (PoC) testing for using blockchain technologyfor digitalization of checks in the...
View ArticleNew malware successfully attacked industrial sectors in over 30 countries
A new wave of targeted attacks against the industrial and engineering sectors in multiple countries around the worldhave been discovered by the Kaspersky Lab Global Research and Analysis Team.Using...
View Article