Best Practice stories - Page 89
Time capsule app TimeHop breached, 21 million users affected
Tue, 10th Jul 2018
#
firewalls
#
mfa
#
cloud security
The breach occurred as an access credential to TimeHop's cloud computing environment that didn't have multifactor authentication was compromised.
Collaboration tool APIs leaving organisations vulnerable
Mon, 9th Jul 2018
#
uc
#
firewalls
#
breach prevention
Alongside the migration to the cloud has been the rise of application programming interfaces (APIs) and artificial intelligence (AI).
Best practices: Preventing and recovering from ransomware attacks
Fri, 6th Jul 2018
#
malware
#
dr
#
ransomware
With ransomware attacks on the rise since 2017's WannaCry incident, organisations must adopt robust prevention and recovery measures to protect critical data.
Why internal financial controls are more important than ever
Tue, 3rd Jul 2018
#
data protection
#
blackline
#
study
Global research from BlackLine suggests that data is increasingly seen as one of a company's most crucial assets, yet it's always at risk.
Despite more training, SMBs feel unprepared for cyberattacks - Webroot
Mon, 2nd Jul 2018
#
malware
#
ransomware
#
phishing
Despite rigorous training, most SMBs in the US, UK, and Australia feel unprepared for cyber threats, says Webroot, highlighting the evolving nature of attacks.
Juniper Networks' releases new data fabric offering
Mon, 2nd Jul 2018
#
network infrastructure
#
sd-wan
#
hyperscale
Juniper Networks unveils new data fabric offering, unifying campus and data centre architectures. Enhanced SD-WAN and multicloud migration tools included.
Rackspace takes next step in AWS migration certification
Thu, 28th Jun 2018
#
devops
#
migration
#
hyperscale
As an AWS Migrations Acceleration Program Partner, it can help customers reduce the risk of migrating to AWS cloud.
Service providers take note: an insight into the future of work
Wed, 27th Jun 2018
#
partner programmes
#
supply chain
#
managed services
The $3 trillion services market hovers on the cusp of disruption as organisations worldwide begin to transform the way they work forever.
Three effective strategies for protecting your backups from ransomware
Mon, 25th Jun 2018
#
storage
#
malware
#
dr
Three key things you should be doing with your data protection strategy to make sure your backups are there when you need them most.
Here's what the threat landscape currently looks like, according to Fortinet
Fri, 22nd Jun 2018
#
malware
#
edutech
#
firewalls
Fortinet says there are indications that some cybercriminals now prefer hijacking systems and using them for cryptomining.
AI for enterprise: Data lakes for decision-making
Fri, 22nd Jun 2018
#
storage
#
ai
#
retail
Enterprise AI is becoming increasingly important as businesses look to enhance employee experience and remain agile in today's technological environment.
HPE introduces service to optimise public, private and hybrid cloud consumption
Wed, 20th Jun 2018
#
hybrid cloud
#
hyperscale
#
public cloud
HPE GreenLake Hybrid Cloud delivers cloud-native operations, compliance, and financial control for AWS, Microsoft Azure and Microsoft Azure Stack.
Palo Alto Networks extends Cyber Range reach through first APAC facility
Tue, 19th Jun 2018
#
edutech
#
firewalls
#
network infrastructure
The Sydney Cyber Range is now the company's first Asia Pacific Cyber Range facility, and the fourth permanent facility worldwide.
Breaking down the ASD's “top four” strategies to mitigate cybersecurity incidents
Mon, 18th Jun 2018
#
pam
#
cybersecurity
#
healthtech
We take a deep dive into the absolute essential aspects of a robust security strategy, as outlined by the Australian government.
By the numbers: Cybercrime's trillion-dollar cost to Asia Pacific
Tue, 12th Jun 2018
#
cybersecurity
#
microsoft
#
cybercrime
A recent Microsoft report reveals that cyber attacks cost the Asia Pacific region USD $1.745 trillion annually, equivalent to 7% of its GDP.
Interview: State-sponsored cyber attacks - it's not about the 'who', but the 'how'
Mon, 11th Jun 2018
#
cybersecurity
#
juniper networks
#
new zealand government
With every major cyber attack comes the question of who exactly was behind it - and if that attack was condoned or even sponsored by nation-states.
The war on infrastructure: DDoS is designed to disrupt
Mon, 11th Jun 2018
#
ddos
#
arbor networks
#
netscout
The reality is that many of the DDoS attacks happening today are designed to disrupt - not to steal something.
SAP boosts offerings with AI, ML and blockchain solutions
Thu, 7th Jun 2018
#
uc
#
hyperscale
#
public cloud
SAP has released a range of new products for the future of the enterprise, including expanding its cloud offerings and a new blockchain-aaS solution.
How partners can improve profit through operational efficiency
Wed, 6th Jun 2018
#
digital transformation
#
partner programmes
#
cloud services
Achieving operational efficiency requires an unflinching examination of how well (or not) operations run today.
IoT, chip processors emerging as new cyber battlegrounds – report
Tue, 5th Jun 2018
#
malware
#
ransomware
#
cybersecurity
The escalating cyber arms race shifts focus to IoT and chip processors, as ransomware variants surge by 101% in 2017, warns SonicWall's new report.