Opinion stories - Page 267
The business case for storage simplicity
Mon, 27th Mar 2017
#
storage
#
converged infrastructure
#
healthtech
Revolutionising IT: Firms push for simple storage systems to fuel business efficiency and slash costs in the digital cloud era.
Edge analytics – the pros and cons of immediate, local insight
Mon, 27th Mar 2017
#
network infrastructure
#
edge computing
#
iot
In a few years there will be an additional 15 to 40 billion devices generating data from the edge vs. what we have today. That brings new challenges.
Should IT pros care about augmented reality?
Mon, 27th Mar 2017
#
gaming
#
hyperscale
#
dc
AR might revolutionise business, but for IT pros, it's likely to just mean business as usual—and next-level gaming at home.
The ins and outs of securely operating the enterprise cloud
Fri, 24th Mar 2017
#
ddos
#
smart cities
#
hyperscale
Today, and more than ever before, a multi-layered approach to cloud security is no longer an option but a requirement.
Moving towards DevSecOps to save time and money
Thu, 23rd Mar 2017
#
devops
#
application security
#
devsecops
The big development project is almost ready to go live, inside the deadline. Just your security review to go. What happens next?.
Schneider Electric: The data center cool down
Wed, 22nd Mar 2017
#
datacentre infrastructure
#
hyperscale
#
dc
Schneider Electric leads the cooling charge as Australian data centres weather the heatwave; proactive measures key to uptime.
Enterprise file sync and share comes of age
Mon, 20th Mar 2017
#
ovum
#
file sharing
#
opinion
The workforce needs to access all relevant documents, files, and information via any screen, from any location, at any time.
5G aside, operators need to keep pushing 4G coverage
Mon, 20th Mar 2017
#
uc
#
5g & beyond
#
wireless networks
With so much recent focus on 5G, it is easy to overlook the importance to mobile operators of continuing to drive up usage over their LTE networks.
Identity theft - have you ever pen tested procedures?
Mon, 20th Mar 2017
#
devops
#
mfa
#
iam
There is a focus on technical aspects of penetration tests, network and application security, while the chain is only as strong as its weakest link.
Why we need to stop calling it the 'year of ransomware'
Mon, 20th Mar 2017
#
malware
#
dr
#
ransomware
Without fail for the past few years, there's someone who takes it upon themselves to declare it the 'year of ransomware.' That's nothing new.
Comparing master data management with application data management
Mon, 20th Mar 2017
#
data management
#
opinion
#
analyst report
Gartner Analysts delve into MDM vs. ADM, unravelling the complexities of data governance from tactical perspectives.
The cybersecurity scourge of credentials theft
Thu, 16th Mar 2017
#
physical security
#
ai security
#
ai
Cybercriminals want your credentials and your employees' credentials. When those hackers succeed in stealing that information, it can be a nightmare.
What kind of impact will IoT have on data centers in 2017?
Thu, 16th Mar 2017
#
hyperscale
#
iot
#
dc
IoT's 2017 surge to drive data centre industry transformation, impacting design, deployment, and security, with over 24bn devices expected by 2020.
Why big data protection is actually a team sport
Wed, 15th Mar 2017
#
ddos
#
data analytics
#
siem
Across the globe, backdoors in IoT systems provide hackers with millions of unprotected gateways into IT infrastructure.
How Australia's Essential Eight sets the standard for data protection & breach notification
Tue, 14th Mar 2017
#
breach prevention
#
cybersecurity
#
data breach
Globally, more and more jurisdictions are releasing mandates that will have a substantial impact on companies regarding breach notification.
Power to the people – creating trust in data with collaborative governance
Tue, 14th Mar 2017
#
uc
#
data protection
#
contact centre
Collaborative data governance is an easy way for IT to help ensure that the quality, security, and accuracy of enterprise information is preserved.
Here are the top trends in Android ransomware right now
Tue, 14th Mar 2017
#
malware
#
ransomware
#
cybersecurity
Android devices are used to store increasing amounts of valuable data, making Android ransomware ever more worthwhile for attackers.
Google makes shift towards enterprise with G-Suite at Google Cloud Next 2017
Mon, 13th Mar 2017
#
hyperscale
#
public cloud
#
microsoft
So many vendors are now pushing the digital workplace standard forward rather than just supporting how users currently work.
Gartner: Why there is No Intelligence in AI
Mon, 13th Mar 2017
#
ai
#
opinion
#
analyst report
Gartner debunks AI hyperbole, explaining 'intelligence' as a misnomer for the evolving landscape of astonishing tech advancements.
Welivesecurity reports new crypto-ransomware hitting macOS
Mon, 13th Mar 2017
#
malware
#
ransomware
#
cybersecurity
Crypto-ransomware campaign for Mac targets users with fake patcher applications distributed via BitTorrent sites.