Laptops stories - Page 54
Why the C-suite must not be exempt from cyber defense training
Wed, 31st Jan 2018
#
phishing
#
email security
#
breach prevention
Some C-suite executives do not think they need training or education to spot attacks because they don't think they would ever fall for an attack.
How businesses can prepare for the Notifiable Data Breaches legislation
Tue, 23rd Jan 2018
#
firewalls
#
network infrastructure
#
network security
Australian organisations are likely to embrace mandatory data breach reporting requirements and most businesses believe it should be mandatory.
Interview: Randtronics' take on encryption - and why quantum computing is not a threat
Mon, 22nd Jan 2018
#
encryption
#
quantum computing
#
opinion
Randtronics founder Bob Adhar explains why encryption is indispensable in cybersecurity and how the firm is bracing for quantum computing's emergence.
Corporate users warned Intel AMT flaw has 'destructive' potential
Wed, 17th Jan 2018
#
intel
#
f-secure
#
security vulnerabilities
Anyone who gains physical access to a machine could create a backdoor in less than 30 seconds and use the backdoor to remotely monitor activities.
Just how dark is the dark web? The rise of Ransomware-as-a-Service
Thu, 11th Jan 2018
#
malware
#
firewalls
#
network infrastructure
These packages allow individuals with little technical skill, to attack businesses and individuals with relative ease.
Intel CEO addresses Spectre and Meltdown bugs at CES keynote
Wed, 10th Jan 2018
#
semiconductors
#
intel
#
spectre
Kraznich advised users to apply any updates from your operating system vendor and system manufacturer as soon as they become available.
Razer's project Linda is the Frankenstein's monster of laptops
Wed, 10th Jan 2018
#
razer
#
ces
#
mobility
Razer unveils Project Linda, a bold hybrid laptop powered by the Android-based Razer Phone, aiming to merge smartphone convenience with laptop capabilities.
ASUS announces the world's thinnest convertible laptop
Tue, 9th Jan 2018
#
asus
#
mobility
#
ssd storage
ASUS recently announced the availability of the ZenBook Flip S UX370, the world's thinnest convertible laptop...
Intel processor vulnerabilities: What you need to know about Meltdown and Spectre
Mon, 8th Jan 2018
#
semiconductors
#
microsoft
#
google
Desktops, laptops, and smartphones running on vulnerable processors can be exposed to unauthorized access and information theft.
Affordable digital training that works for you
Mon, 8th Jan 2018
#
martech
#
microsoft
#
adobe
Bringyourlaptop.com have made it easy and affordable for you to increase your digital skill set and get ahead of the competition.
Inside modern hacking: The seven stages of a breach
Tue, 19th Dec 2017
#
pam
#
iam
#
cybersecurity
In modern hacking, securing privileged accounts is crucial as breaches can have disastrous impacts on organisations. Explore the seven stages of a hack.
Are You on his “Good List?”: 2017 Christmas gift guide
Tue, 19th Dec 2017
#
hp
#
tablets
#
sphero
While I'm sure most of you have been more naughty than nice, we all deserve a little bit of Christmas cheer...
IDC names VMware leader in enterprise mobility management
Thu, 14th Dec 2017
#
virtualisation
#
iot
#
it automation
An industry-leading UEM solution, high-profile customer deployments and IoT-focused solutions and partnerships solidify VMware's position as a leader.
Exclusive interview: Lenovo on channel development and AI
Thu, 14th Dec 2017
#
hyperscale
#
dc
#
ai
Lenovo executives Matt Codrington MD for ANZ and Amar Babu, APAC COO talk about why the channel is so important to their company.
Only 20% of e-waste is recycled - and this needs to change, says United Nations
Thu, 14th Dec 2017
#
uc
#
clean technologies
#
voip
A new report reveals that e-waste is a growing crisis, with 44.7 million metric tonnes generated in 2016, and a further increase predicted for 2021.
Expert insights: Why visibility and forensics matter in cybersecurity
Wed, 13th Dec 2017
#
cybersecurity
#
opinion
#
cybercrime
A Six-Point Checklist for making sure that your security teams have the capacity to track the root causes and progress of noxious malware
.
Guardians of data: Who watches over our information
Wed, 13th Dec 2017
#
data protection
#
pam
#
opinion
Australian businesses lost over AUD $2 million to hackers last year, prompting new laws. Now, IT teams act as vital guardians of data security.
Working through the holiday season? Four ways to keep your mobile device secure
Wed, 13th Dec 2017
#
endpoint protection
#
edr
#
wireless networks
As the holiday season begins, Ixia warns that remote workers must not overlook mobile device security to avoid cyber threats.
Hands-on Review: D-Link DSL-5300 Cobra AC 5300 Wave 2 Wi-Fi Modem Router
Tue, 12th Dec 2017
#
gaming
#
digital entertainment
#
wireless networks
The D-Link DSL-5300 Cobra AC 5300 marries eye-catching design with cutting-edge Wi-Fi capabilities, offering top-tier performance and future-proof versatility.
Three futuristic instruments straight out of a Star Wars cantina
Mon, 11th Dec 2017
#
digital entertainment
#
digital music
#
tablets
Explore three futuristic musical instruments resembling those from a Star Wars cantina, including the Marimba Lumina, GePS, and Eigenharp.