HPE announces comprehensive flash portfolio update
Hewlett Packard Enterprise (HPE) has announced a comprehensive flash portfolio update with new products and data protection solutions.The new offerings include a more powerful midrange HPE 3PAR...
View ArticleWhy Singapore companies need to comply with the GDPR
A global study from Veritas Technologies has revealed that 86% of organizations worldwide are concerned that a failure to adhere to the upcoming General Data Protection Regulation (GDPR) could have a...
View ArticleCA says its payment security tool reduces online fraud loss by 25%
CA Technologies has announced CA Risk Analytics Network, the payment industry’s card-issuer network that stops card-not-present fraud instantly for network members using real-time behavior analytics,...
View ArticleIBM and Nutanix launch hyperconverged initiative
IBM and Nutanix have announced a multi-year initiative to bring new workloads to hyperconverged deployments. The integrated offering aims to combine Nutanix’s Enterprise Cloud Platform software with...
View ArticleHackers now use subtitles to take control of a victim's media players
Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s...
View ArticleTripartite partnership to drive cloud ambition in Asia Pacific
Huawei, REDtone and Fusionex have formed a tripartite partnership to serve the rapid increase in demand for big data and analytics Cloud solutions in Asia Pacific. According to Huawei’s Global...
View ArticleSchneider Electric introduces compact UPS for hyper scale data centers
Schneider Electric has introduced Galaxy VX, a compact three-phase uninterruptible power supply (UPS) with flexible operating modes for large facilities, data centers and business-critical...
View ArticleHow to conduct an IoT pen test
Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are...
View ArticleVMware to deliver VMware Horizon Cloud on Microsoft Azure
VMware, Inc. has announced it will deliver VMware Horizon Cloud on Microsoft Azure. The integration helps customers accelerate the move to Windows 10 and brings VMware virtual desktops and applications...
View ArticleInnovation is not pervasive in most family businesses: study
Innovation is not pervasive in most family businesses, with 66 percent of respondents citing that only their management team thinks about innovation, according to a KPMG report.Many family businesses...
View ArticlePeople love to work and are geeking about the gig economy
The way we work is changing. You probably already know that. But what’s even more interesting is how it’s changing. As a new dawn of a tech-savvy workforce, and millennials reigning the global...
View ArticleHacking attempts targeting web applications varied greatly by industry
Hacking attempts targeting web applications vary greatly by industry, with SQL Injection accounting for the highest percentage in transportation and manufacturing-related industries, according to Penta...
View ArticleOracle announces cloud-based content hub
Oracle has announced Oracle Content and Experience Cloud, a digital experience platform that enables organizations to manage and deliver content to any digital channel to drive effective engagement...
View ArticlePassword and username reuse is major threat to enterprise security: study
Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover. This is a type of brute force attack whereby large sets of credentials are automatically...
View Article60% of IoT attacks in 2016 originated from Asia
The number of denial-of-service (DoS) or distributed-denial-of-service (DDoS) cyberattacks doubled from 3% to 6% in 2016, due to the lack of sufficient security controls of Internet-connected Internet...
View ArticleCharles & Keith's online card acceptance rate rises following deployment of...
Charles & Keith, a leading fashion retailer in Asia Pacific, has deployed CyberSource's full suite of payment, fraud management and tokenization services for selected markets. With CyberSource's...
View ArticleGlobal political and economic uncertainty create a new breed of digital...
Despite two-thirds (64 percent) of organizations adapting their technology strategy because of unprecedented global political and economic uncertainty, 89 percent are maintaining or ramping up...
View ArticleHow to Combat Monitoring & Security Tool Overload
Are you managing your security and monitoring tools or are they managing you? We all want to say that WE are in control, right? Unfortunately, data from two recent Enterprise Management Associates...
View ArticleKubernetes foundation takes on container networking
The Cloud Native Computing Foundation (CNCF), which seeks to drive large-scale cloud computing with an emphasis on containers and microservices, has just added the Container Network Interface (CNI)...
View ArticleMicrosoft's DNA storage tech may fit in an enterprise
Microsoft has apparently firmed up its plans for a DNA-based storage device that it expects to be commercially available within about three years.The software giant originally unveiled its research...
View Article