Best Practice stories - Page 61
Six essential steps to a successful cybersecurity program
Mon, 26th Jun 2017
#
endpoint protection
#
risk & compliance
#
edr
Firms are at a disadvantage in the fight against cybercriminals but building a mature cybersecurity program can help overcome those problems.
How to manage data analytics so all users can make sense of the insights
Wed, 21st Jun 2017
#
data analytics
#
martech
#
planning
Data analytics are only worth the time if firms can make smarter decisions faster than their competitors. But it's easy to get swept up in the flood.
Rackspace presents five ways to reduce your ransomware risk
Tue, 20th Jun 2017
#
malware
#
ransomware
#
encryption
Rackspace reveals key strategies to combat ransomware, emphasizing robust backups and vigilant patch management.
Singapore & Australia forge partnership to tackle cybersecurity issues
Wed, 7th Jun 2017
#
cybersecurity
#
australian government
#
csa
Singapore and Australia sign MOU to strengthen cybersecurity cooperation, including information sharing and joint exercises.
Schneider Electric: The impact of the cloud on hybrid data center designs
Thu, 1st Jun 2017
#
datacentre infrastructure
#
power / energy
#
hybrid & remote work
Cloud adoption is driving the need to rethink the redundancy requirements of edge data centers, says Kevin Brown of Schneider Electric.
Cloud giants form alliance to accelerate genome research
Thu, 25th May 2017
#
cloud services
#
alibaba
#
intel
BGI teams up with Broad Institute, Intel, and Alibaba Cloud to provide free access to Genome Analysis Tool Kit (GATK4) on BGI Online platform.
Contractors, unstructured data amongst major security concerns, says SailPoint
Wed, 17th May 2017
#
casb
#
passwords
#
shadow it
SailPoint's Market Pulse Survey highlights contractors and unstructured data as major security risks for enterprises.
How to protect your organisation from WannaCry ransomware
Mon, 15th May 2017
#
malware
#
ransomware
#
ai security
Defend against the global WannaCry threat with robust cybersecurity measures and constant vigilance, says Carbon Black's team.
IoT: How the right upfront decisions can mean better performance, scalability and security
Wed, 10th May 2017
#
datacentre infrastructure
#
hyperscale
#
iot
Planning IoT? Privacy, scalability, and robust interconnection are key for peak performance and security, experts advise.
New online training tool to help Kiwi businesses slash their cyber risk
Tue, 2nd May 2017
#
edutech
#
ai security
#
kordia
Aura Information Security has finished work on the very first module of its e-learning programme as part of the Cyber Security by Kordia suite.
Why stakeholder collaboration is key to your cloud success
Fri, 21st Apr 2017
#
devops
#
apm
#
cybersecurity
However, adoption of the cloud often starts with the infrastructure team and fails to bring other key teams along on the journey.
Polycom bumps up information security; becomes ISO certified
Wed, 19th Apr 2017
#
hybrid & remote work
#
wfh
#
iso certification
Polycom achieves ISO/IEC 27001:2013 certification, strengthening its information security practices and providing assurance to customers.
Moving towards DevSecOps to save time and money
Thu, 23rd Mar 2017
#
devops
#
application security
#
devsecops
The big development project is almost ready to go live, inside the deadline. Just your security review to go. What happens next?.
Getting more Instagram followers? Could be a scam
Wed, 15th Mar 2017
#
malware
#
cybersecurity
#
instagram
Cybercriminals have been targeting Instagram users by luring them to install these apps, which claim to boost their Instagram followers.
10 reasons why cybercriminals target smartphones
Mon, 6th Mar 2017
#
malware
#
payment technologies
#
cybersecurity
Smartphones aim to heighten convenience, but there is a real feeling that they're becoming a bigger target for cybercriminals. Why?.
Interview: Bring on the barbecue - how IT & OT must work together to build better security
Wed, 1st Mar 2017
#
iot
#
partner programmes
#
supply chain
At 31c0n, BT's Bryan K Fite emphasised the crucial unity of IT and OT for robust security, likening it to a “big barbecue” of collaboration.
The time is now - Secure your organisation from threats you can and can't see
Wed, 1st Mar 2017
#
application security
#
advanced persistent threat protection
#
software
There are two types of companies; Those that have been hacked, and those who don't know they have been hacked.
Hey data center customers, let's practice hygge
Tue, 28th Feb 2017
#
datacentre infrastructure
#
hyperscale
#
dc
Data centre dialogue gets a hygge makeover, fostering joy in simplicity and strengthening customer relationships.
Learning across industries: 5 vertical looks at data Centers
Fri, 24th Feb 2017
#
datacentre infrastructure
#
hyperscale
#
dc
Still, the opportunity for cross-industry learnings are significant as are those from the private to public sector and vice versa.
CompTIA zeroes in on behavioural analytics with new global security certification
Tue, 21st Feb 2017
#
data analytics
#
martech
#
planning
CompTIA introduces CSA+ certification, pioneering behavioural analytics in global IT security to tackle advanced cyber threats.