Best Practice stories - Page 77
Frost & Sullivan honours Honeywell's IIoT value creation
Wed, 23rd Jan 2019
#
uc
#
honeywell
#
broadband
Frost and Sullivan has awarded Honeywell the 2018 Global Customer Value Leadership Award for its cybersecurity innovations and transformative IIoT solutions.
Why it's critical to deploy emerging technologies in ways that will benefit society
Tue, 22nd Jan 2019
#
digital transformation
#
biometrics
#
quantum computing
Society needs to move beyond trusting emerging technologies and focus on deploying them in ways that benefit society, says Unisys chief trust officer.
How to successfully phase out legacy physical security systems
Mon, 21st Jan 2019
#
physical security
#
identity cards
#
security card
Legacy physical security systems often create a cumbersome and difficult environment for those that need to make use of them.
Palo Alto says supply chain is cybersecurity's weakest link
Fri, 18th Jan 2019
#
malware
#
firewalls
#
network infrastructure
Palo Alto Networks warns that supply chains are the weakest link in cybersecurity, urging firms to evaluate partners' defences to prevent breaches.
APAC FinTech network launches to encourage cross-border innovation
Thu, 17th Jan 2019
#
fintech
#
fintech australia
#
fintechnz
Nine associations formally launched the network by signing a Statement of Intent at the Asian Financial Forum event in Hong Kong.
The future of data with machine learning and cloud advancement
Tue, 8th Jan 2019
#
devops
#
iaas
#
apm
Organisations that don't take the reins in terms of machine learning and cloud adoption may see themselves left behind.
AI: Get started now, but on the right foot.
Mon, 7th Jan 2019
#
uc
#
martech
#
ai
AI specialist Rick Rider's guide to getting AI experimentation right as the technology becomes a necessity in 2019.
Cyber Readiness Institute launches global training program
Wed, 2nd Jan 2019
#
martech
#
commerce systems
#
supply chain
The Cyber Readiness Institute is launching a new program to help small businesses understand basic cybersecurity issues.
How protecting critical infrastructure starts with securing social media
Tue, 1st Jan 2019
#
iam
#
cybersecurity
#
passwords
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
5 strategies for widening the colocation data centre talent pool
Fri, 21st Dec 2018
#
datacentre infrastructure
#
hyperscale
#
power / energy
The colocation industry has one of the lowest unemployment numbers across industries, making talent acquisition a difficult task.
Mac malware on WatchGuard's top ten list for first time
Tue, 18th Dec 2018
#
malware
#
firewalls
#
network infrastructure
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Disruption in the supply chain: Why IT resilience is a collective responsibility
Fri, 14th Dec 2018
#
dr
#
supply chain
#
cloud services
Organisations must build resilient relationships to thrive in the face of disruption, using IT infrastructure to promote trust, agility, and collaboration.
Businesses too slow on attack detection – CrowdStrike
Thu, 13th Dec 2018
#
malware
#
ai security
#
ai
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Don't wait till disaster strikes – best practices when implementing DR
Thu, 13th Dec 2018
#
dr
#
risk & compliance
#
data privacy
As more companies migrate their data to the cloud, disaster recovery becomes critical to ensure their operations are not disrupted by unforeseen events.
Critical data centre operations is just like F1
Thu, 13th Dec 2018
#
network infrastructure
#
datacentre infrastructure
#
hyperscale
Schneider's David Gentry believes critical data centre operations share many parallels to a formula 1 race car team.
Hands-on Review: Quick and easy authentication with YubiKeys
Wed, 12th Dec 2018
#
gaming
#
mfa
#
digital entertainment
Consumers tend to believe that setting up two-factor authentication puts them at the height of cybersecurity best practice – but this belief is misled.
Using blockchain to ensure regulatory compliance
Wed, 12th Dec 2018
#
uc
#
ecm
#
blockchain
Macro 4's new Columbus DW software enhances data protection & regulatory compliance through document redaction & blockchain integration.
Spark Lab launches free cybersecurity tool for SMBs
Tue, 11th Dec 2018
#
cybersecurity
#
spark
#
spark labs
Spark Lab has launched a new tool that it hopes will help New Zealand's small businesses understand their cybersecurity risks.
Securing hotel technology to protect customer information
Mon, 10th Dec 2018
#
firewalls
#
network infrastructure
#
network security
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Pitfalls to avoid when configuring cloud firewalls
Mon, 10th Dec 2018
#
cloud security
#
cloud services
#
firemon
Misconfigured cloud firewalls are a cybercriminal's dream, making firms vulnerable to breaches like the 2013 Target hack and 2018 Verizon leaks.