What Extreme's string of networking acquisitions means for enterprises
Extreme Network’s recent string of acquisitions – including it’s recent $100 million auction-buy of Avaya’s networking business, it’s purchase of Brocade’s Ethernet IP networking assets and its...
View ArticleHPE highlights innovation in software-defined IT, security at Discover
At its Discover conference, HPE pulled back the curtains on firmware security and advances in software-defined IT aimed to reduce costs and increase system flexibility for its users and help it stay...
View ArticleGitHub Enterprise users get project management, data access improvements
GitHub has added data access tools and advanced project management to GitHub Enterprise, the on-premises version of the company’s code-sharing platform.Here are the notable features in GitHub...
View Article7 ways AI will revolutionize business travel
In April, United Airlines hit a huge pocket of public relations turbulence after a passenger was forcibly removed from one of its partners’ airplanes. The incident raised questions about blindly...
View ArticleFujitsu, 1QBit work on quantum-inspired AI cloud service
Fujitsu and 1QB Information Technologies are collaborating on applying quantum-inspired technology to the field of artificial intelligence (AI), focusing on the areas of combinatorial optimization and...
View ArticleEmployees in Singapore lack the tools for effective collaboration
Employers in Singapore are not providing the right tools for employees to effectively collaborate and communicate internally across the organization, as well as externally with customers, according to...
View ArticleRetarus E-Mail Security now includes E-mail Live Search and optimized...
Global information logistics provider Retarus continues the expansion of its e-mail security services by making a high-performance phishing filter and a new e-mail live search portal available to its...
View ArticleEY bolsters APAC cyber-security business with Australian acquisition
Professional services firm EY has entered into an agreement to acquire one of Oceania’s leading identity and access management (IAM) providers, Melbourne- based Open Windows Australia Pty Ltd.The...
View ArticleChina's new cybersecurity law brings significant challenges and shift in...
The controversial new Cybersecurity Law which came into force on 1 June 2017 in China brings significant change and some uncertainty for companies but is to be expected in a rapidly evolving...
View ArticleANA Systems chooses IBS Software as a strategic technology partner
IBS Software has entered into a strategic partnership with ANA Systems (ASY), the IT division of ANA group (ANA), to enhance it's global delivery capabilities for innovative technology solutions for...
View ArticleThe top 5 mobile security threats
A smartphone can feel like a ticking time bomb to IT security pros. With the BYOD trend now well established in the workplace, and employees less vigilant about avoiding malicious links, the chances...
View ArticleDon't be left behind by IPv6 deployment, ISOC warns enterprises
They have the resources, the expertise and, though they may not realize it, the need -- but it turns out that enterprises are often the ones that don't yet have IPv6.That's the finding of the Internet...
View ArticleiOS 11 is here: Top 6 new features you need to know from WWDC
Siri in iOS 11 has learned to sound like an actual human—and that’s just the beginning when it comes to the new mobile operating system for iPhones and iPads.Apple CEO Tim Cook and friends gave us a...
View ArticleHow Windows 10 changes enterprise mobility management
Since its release 21 months ago, Windows 10 has forced companies to rethink how enterprise mobile management (EMM) is handled in their corporate environments.Unlike its predecessors, Windows 10 comes...
View ArticleLegal impact of Data Protection and Management in the Digital Age
With increasing access to mobile devices and the internet, the amount of data created annually worldwide is predicted to soar to 180 zettabytes (180 trillion gigabytes) in 2025, with approximately 80...
View ArticleA 10-step cybersecurity checklist for smart cities
In order to guide smart city developers, Trend Micro has come up with a quick 10-step cybersecurity checklist they can refer to when implementing smart technologies.Cities will get smarter over time....
View Article'Judy' is possibly the largest malware campaign found on Google Play
Check Point researchers have discovered another widespread malware campaign on Google Play, Google’s official app store. The malware, dubbed “Judy”, is an auto-clicking adware which was found on 41...
View ArticleNumber of enterprise mobile apps is not accelerating, says Gartner report
More than a quarter of enterprises globally have not built, customized or virtualized any mobile apps in the last 12 months, according to the latest mobile app survey by Gartner, Inc.This number is...
View ArticleReport identifies roadblocks to digital transformation in APAC
Many IT professionals in Asia Pacific are facing significant challenges when it comes to digital transformation and application development. A new report from OutSystems reveals that most organizations...
View ArticleTenable launches cloud-based vulnerability management platform
Tenable Network Security, Inc. has released its cloud-based Tenable.io platform, delivering new and enhanced capabilities to empower organizations to understand and reduce their cyber risk across the...
View Article