The top types, sources, and targets of data breaches
Data breaches increased 15% in the first six months of 2016 compared to the last six months of 2015, according to the the Breach Level Index of Gemalto.Worldwide, there were 974 reported data breaches...
View ArticleHK companies slowly adopting cloud computing to curb costs
Helping the business reduce costs and increase revenues is still the primary focus of Chief Information Officers in Hong Kong.According to the study “Cloud Computing Is Helping CIOs Deliver The Agility...
View ArticleBT, Microsoft aim to simplify hybrid cloud adoption
BT has announced BT Compute for Microsoft Azure, a new service that allows BT customers to order Microsoft Azure alongside BT’s own cloud services through its Compute Management System (CMS) online...
View ArticleCloud-based ERP helps HK's TAL keep up with fashion trends
TAL Apparel Limited, a provider of innovative products and services across different stages of the fashion supply chain, has begun implementing Infor CloudSuite Fashion – a solution specifically...
View ArticleCisco is helping companies generate value from cloud
While cloud adoption continues to accelerate, few organizations are maximizing the value that cloud can offer. According to a Cisco-sponsored study, nearly 68 percent of organizations are using cloud...
View ArticleAccenture creates prototype of editable blockchain technology
Accenture has created a prototype of a new capability that enables blockchain technology to be edited under extraordinary circumstances to resolve human errors, accommodate legal and regulatory...
View Article3 considerations when designing the workplace of the future
The increasingly fierce war for talent is prompting more organizations to take into account the physical workplace to complement their talent attraction strategies. Three key areas organizations should...
View ArticleHow to protect your mission-critical information
Given the vast and increasing volumes of data within organizations today, securing your data can seem an insurmountable task. But you can get your arms around it if you assess the value of your data...
View ArticlePact deepens integration between Huawei server and Oracle database
Huawei and Oracle have signed a cooperation memorandum to deepen technical cooperation based on the Huawei KunLun Mission Critical Server. The memorandum proposes deep integration between the Huawei...
View ArticleDigital Realty simplifies interconnection among cloud services
Digital Realty has released its Service Exchange, an interconnection platform that facilitates direct, private and secure connections to multiple cloud service providers – including Amazon Web Services...
View ArticleSDN, NFV touted as critical components of private cloud
Many local firms – especially those using private or hybrid clouds – may not have fully embraced the potential of advanced technologies because their networking resources lack the scalability, agility...
View ArticleIoT devices increasingly used to carry out DDoS attacks
Cybercriminal networks are taking advantage of lax IoT device security to spread malware and create zombie networks, or botnets, unbeknownst to their device owners, according to research by Symantec...
View ArticleCloudera, CenturyLink to deliver managed data services
Cloudera and CenturyLink Global IT Services are working to deliver big data as a service to enable customers to gain value from all their data.As part of being a preferred partner, CenturyLink’s Global...
View ArticleMost people don't know they have been victims of a data breach
At a time when millions of people’s personal information can be exposed by a single data breach, as was recently the case with the breach of Dropbox that exposed personal information on upwards of 68...
View ArticleThe digital transformation journey of Thailand's PTT
In the digital transformation era, even business titans can find themselves brought low by rapidly changing customer needs. Consumers in Thailand are far more connected through mobile and social cloud...
View ArticleDDoS attacks on businesses: Not just once, but many times
DDoS attacks are not a one-off occurrence, with many companies subjected to multiple attacks in the last year, according to the Corporate IT Security Risks 2016 study, an annual survey conducted by...
View ArticleEnterprises battling 9x more unknown malware: study
Unknown malware continues its exponential and evolutionary growth, according to the Check Point Security Report and SANS 2016 Threat Landscape Study.Researchers found a 9x increase in the amount of...
View ArticleDell rolls out its best mobile thin clients yet
Dell has announced a new, redesigned mobile thin client portfolio for those who need to be on the move, but also require critical intellectual property (IP) and data to be protected – even against...
View ArticleTaking the world by storm: The augmented technology revolution
Augmented reality (AR) has captured the attention of everyone worldwide. This was evident yet again when Niantic launched the Pokémon Go game application. Since its release in July 2016, the app has...
View ArticleDarktrace can now be deployed in cloud-only environments
Darktrace has announced that it is now capable of deploying in cloud-only environments.As more and more companies turn to cloud infrastructures, security has become a critical concern, and visibility...
View Article