News

News Archive

  • February 21, 2019 21 Feb'19

    Businesses urged to prepare for extortion campaigns

    C-level executives, lawyers and doctors are the top extortion targets of cyber criminals, a report by researchers tracking thousands of sextortion attempts reveals

  • Sponsored News

    • How AI Will Blanket Your World

      Whether we are aware of it or not, artificial intelligence is already all around us. We use AI when we speak to our digital assistants. AI is in email services that automatically complete our sentences or schedule appointments for us. We encounter it when bots field our queries on websites or smartphones unlock upon recognizing our faces. See More

    • Supply Chain Transparency Matters Now More Than Ever

      In the early stages of the COVID-19 pandemic, many companies discovered to their dismay how little visibility they had into their supply chains. Years of focusing on inventory reduction and just-in-time delivery had caused them to lose touch with the imperatives of understanding who was supplying them and what standards were being applied to the parts and components they received. See More

    • 7 Ways for IT to Deliver Outstanding PC Experiences in a Remote Work World

      Managing the personal computing experience was relatively easy when everyone was in the office: IT owned the hardware, maintained the software and ensured that appropriate defences were in place. But with people now dispersed to home offices around the world, in many cases, it’s up to them to take the responsibility for ensuring their PCs are safe and performing at their best. See More

    • Software Protection Isn’t Enough for the Malicious New Breed of Low-Level Endpoint Attacks

      This year’s pandemic has cast a harsh light on the difficulty of securing endpoints, particularly those that aren’t connected to the corporate network. Working without the insulation of the corporate firewall limits IT from auditing and controlling devices at the granular level needed, in many cases leaving it to users to secure their own desktops. See More

    View All Sponsored News
  • February 21, 2019 21 Feb'19

    Redis Labs swaps out open source to protect against public clouds

    While Redis remain open source, higher value modules are now covered by a commercial agreement which limits commercialisation of Redis-based products

  • February 21, 2019 21 Feb'19

    MWC 2019: O2 to launch 5G by Christmas

    Ahead of Mobile World Congress, operator O2 has revealed further details of how it is planning for the advent of 5G

  • February 21, 2019 21 Feb'19

    Cloud backup helps ASL Airlines evade ransomware and keep its business flying, says CIO

    ASL Airlines took home the Best of Show prize at the Best of VMworld 2018 Awards after detailing how adopting a robust and resilient disaster recovery strategy is helping it evade ransomware threats

  • February 21, 2019 21 Feb'19

    UK committed to working with EU cyber security partners

    NCSC CEO uses cyber security conference in Brussels to set out his agency’s position on Brexit, 5G security, Huawei, market incentives and international cooperation on active cyber defence

  • February 21, 2019 21 Feb'19

    Cooperation a key theme of Brussels cyber security symposium

    Fostering trust-based cooperation of like-minded cyber security stakeholders to create new strategies, policies and standards emerged as a key theme at a cyber security conference in Brussels

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close