Best Practice stories - Page 84
Exclusive: The bumpy road to business automation
Mon, 4th Feb 2019
#
it automation
#
rpa
#
ai
Samanage CTO discusses the challenges of AI and automation deployment and offers best practices for successful implementation.
Symantec announces new endpoint response tools
Thu, 31st Jan 2019
#
endpoint protection
#
partner programmes
#
edr
Enterprise IT and Security Ops teams are increasingly challenged to investigate and respond to advanced and emerging threats with available resources and staff.
Proofpoint: Social engineering and credential stuffing attacks up in 2018
Wed, 30th Jan 2019
#
phishing
#
email security
#
cloud services
Proofpoint's 2018 report reveals a surge in social engineering attacks, with phishing incidents up 9% and credential compromises rising 70% since 2017.
Exclusive Q&A: Why businesses are storing useless hardware
Wed, 30th Jan 2019
#
hybrid cloud
#
hyperscale
#
dc
In this exclusive interview, Blancco's Fredrik Forslund details just how expensive the issue of data centre waste has become.
Blue Prism's massive upcoming expansion to RPA platform
Wed, 30th Jan 2019
#
it automation
#
rpa
#
ai
With RPA becoming one of the most important tools to a modern organisation, Blue Prism has big plans for the next few months.
Varonis updates data security offering
Thu, 24th Jan 2019
#
data privacy
#
microsoft
#
threat intelligence
Version 7.0 of the Varonis Data Security Platform features new cloud and threat detection and response capabilities.
Frost & Sullivan honours Honeywell's IIoT value creation
Wed, 23rd Jan 2019
#
uc
#
honeywell
#
broadband
Frost and Sullivan has awarded Honeywell the 2018 Global Customer Value Leadership Award for its cybersecurity innovations and transformative IIoT solutions.
Why it's critical to deploy emerging technologies in ways that will benefit society
Tue, 22nd Jan 2019
#
digital transformation
#
biometrics
#
quantum computing
Society needs to move beyond trusting emerging technologies and focus on deploying them in ways that benefit society, says Unisys chief trust officer.
How to successfully phase out legacy physical security systems
Mon, 21st Jan 2019
#
physical security
#
identity cards
#
security card
Legacy physical security systems often create a cumbersome and difficult environment for those that need to make use of them.
How healthcare can prepare for My Health Record roll-out - Proofpoint
Mon, 21st Jan 2019
#
email security
#
casb
#
supply chain
Australia's healthcare sector is the continent's biggest cybercrime target, according to a July report from the Australian Information Commissioner.
Palo Alto says supply chain is cybersecurity's weakest link
Fri, 18th Jan 2019
#
malware
#
firewalls
#
network infrastructure
Palo Alto Networks warns that supply chains are the weakest link in cybersecurity, urging firms to evaluate partners' defences to prevent breaches.
APAC FinTech network launches to encourage cross-border innovation
Thu, 17th Jan 2019
#
fintech
#
fintech australia
#
fintechnz
Nine associations formally launched the network by signing a Statement of Intent at the Asian Financial Forum event in Hong Kong.
Stronger security needed before open banking arrives - Okta
Tue, 15th Jan 2019
#
malware
#
ddos
#
fintech
As early as July 2019, Australian banks will need to have a system in place that both benefits customers and protects their personal data.
The future of data with machine learning and cloud advancement
Tue, 8th Jan 2019
#
devops
#
iaas
#
apm
Organisations that don't take the reins in terms of machine learning and cloud adoption may see themselves left behind.
AI: Get started now, but on the right foot.
Mon, 7th Jan 2019
#
uc
#
martech
#
ai
AI specialist Rick Rider's guide to getting AI experimentation right as the technology becomes a necessity in 2019.
Cyber Readiness Institute launches global training program
Wed, 2nd Jan 2019
#
martech
#
commerce systems
#
supply chain
The Cyber Readiness Institute is launching a new program to help small businesses understand basic cybersecurity issues.
How protecting critical infrastructure starts with securing social media
Tue, 1st Jan 2019
#
iam
#
cybersecurity
#
passwords
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
5 strategies for widening the colocation data centre talent pool
Fri, 21st Dec 2018
#
datacentre infrastructure
#
hyperscale
#
power / energy
The colocation industry has one of the lowest unemployment numbers across industries, making talent acquisition a difficult task.
Exclusive: Three access management learnings from 2018
Tue, 18th Dec 2018
#
mfa
#
phishing
#
it automation
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
Mac malware on WatchGuard's top ten list for first time
Tue, 18th Dec 2018
#
malware
#
firewalls
#
network infrastructure
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.