Best Practice stories - Page 64
Service providers a weak link in cybersecurity
Tue, 26th Apr 2016
#
uc
#
risk & compliance
#
cybersecurity
Businesses that allow their service providers to access sensitive data are at risk of a cyberattack, warns consulting firm Protiviti.
Aussie Government urges business to take action against cyber threats
Thu, 21st Apr 2016
#
cybersecurity
#
deloitte
#
cyber criminal
Australian businesses are falling behind in cyber security, leaving them vulnerable to cyber criminals, according to Deloitte.
Governments vulnerable to attack, says Palo Alto Networks
Wed, 20th Apr 2016
#
firewalls
#
network infrastructure
#
network security
Government departments are an attractive target for malicious hackers and criminals, making them vulnerable to attack.
TCC Technology named top Thai data center hosting service provider
Fri, 15th Apr 2016
#
hyperscale
#
dc
#
tss technology
Thailand's TCC Technology has been named Frost & Sullivan's Thailand Data Center Hosting Service Provider of the Year.
Watch out, there's a new breed of cyber criminal in town
Tue, 12th Apr 2016
#
uc
#
breach prevention
#
symantec
A new class of professional cyber criminals has emerged, adopting corporate practices to increase the efficiency of their attacks.
Axis teams up with Avaya, EMC and Genetec to complete industry first
Tue, 12th Apr 2016
#
surveillance
#
digital entertainment
#
cybersecurity
Axis forges a cutting-edge security alliance, offering the first validated surveillance platform with Avaya, EMC and Genetec to bolster cyber defences.
Existing security best-practice can handle IoT exposures? Not really
Tue, 12th Apr 2016
#
iot
#
cybersecurity
#
opinion
There is a belief that IoT security exposures can be taken care of with existing IT-centric security practices. Earl Perkins disagrees.
From SAMR to signage
Wed, 23rd Mar 2016
#
digital signage
#
trilbytv
#
pro av
UK schools miss the mark in using digital signage, with ineffective content and heavy IT systems hampering educational outcomes.
Cloud disaster recovery confidence up, but challenges remain
Wed, 9th Mar 2016
#
dr
#
private cloud
#
hyperscale
Confidence in cloud-based disaster recovery is growing, but risks, outages and downtime costs are still posing challenges for enterprises.
SimpliVity rolls out new support tiers and offerings
Tue, 1st Mar 2016
#
converged infrastructure
#
support
#
simplivity
SimpliVity launches new support tiers and services for enterprise applications, including its new proactive support service, OmniWatch.
Two Kiwis recognised for cyber resilience work on global stage
Fri, 26th Feb 2016
#
risk & compliance
#
cybersecurity
#
risk management
Marsh brokers become first New Zealanders to receive cyber resilience accreditation from AXELOS. #cybersecurity.
Data and analytic topics on the minds of CIOs
Thu, 25th Feb 2016
#
opinion
#
analyst report
#
information governance
I had the good fortune to be present (and presenting) at our US CIO Leadership Forum in Phoenix, Arizona this week.
Tracking privileged access vital, says Gartner
Mon, 15th Feb 2016
#
pam
#
analyst report
#
research director
Unless organisations track and review privileged activity, they risk being blindsided by insider threats and errors that cause significant outages.
Hackers exploit wireless networks, steal valuable information
Thu, 28th Jan 2016
#
wireless networks
#
cloud services
#
hackers
Wireless networks are vulnerable, but steps can be taken to protect against attacks, says Netscout's Fluke Networks Enterprise Solutions.
Demand for secure identity solutions grows
Tue, 19th Jan 2016
#
uc
#
wearables
#
cybersecurity
Key trends including ongoing advancements in privacy protection and a more mobile and connected experience will have a big impact on secure identities.
Businesses facing serious risk from haphazard PAM
Mon, 16th Nov 2015
#
network infrastructure
#
pam
#
apm
Haphazard privileged account management is exposing businesses to serious risk according to a new survey from Dell.
Cyber security firm releases remote admin capabilities
Wed, 28th Oct 2015
#
cybersecurity
#
thales
#
best practice
Thales uproots traditional HSM management, launching nifty remote admin features targeting data centres and cloud migrations.
Enterprise IoT devices underestimated and under-secured
Fri, 16th Oct 2015
#
iot
#
risk & compliance
#
cybersecurity
Alarm over IoT security gap: IT experts claim devices in homes and business are under-protected, despite consumer confidence.
Top tips to secure your new iPhone
Mon, 5th Oct 2015
#
apple
#
symantec
#
apple iphone
Protect your iPhone investment - Key steps to assure your data and device remain secure as iPhone mania grips Apple enthusiasts.
Organisations unprepared for the greatest security risks, survey finds
Fri, 2nd Oct 2015
#
breach prevention
#
cyberark
#
cyber attacks
Cyber attackers posing as legitimate insiders represent the greatest security risks to organisations, according to a new survey by CyberArk.