TelcoNews New Zealand - Telecommunications news for ICT decision-makers

Opinion stories - Page 231

Thinkstockphotos 594060406

The importance of integration in enterprise applications

Tue, 9th May 2017
#
uc
#
digital transformation
#
martech
Tech's evolution ushers in the era where seamless integration is vital for enterprise success; firms race to adapt.
Thinkstockphotos 674565164

DDoS: How Big Data can help combat a real and prevalent threat

Mon, 8th May 2017
#
ddos
#
data analytics
#
martech
DDoS attacks are becoming more and more prevalent. More than 2000 attacks observed every day force thousands of websites into shutdown.
Thinkstockphotos 616890412

Fingerprint security & biometrics: Three major myths busted

Mon, 8th May 2017
#
malware
#
biometrics
#
cybersecurity
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
Thinkstockphotos 676380064

No favourites here: What makes up the art of cybersecurity warfare

Mon, 8th May 2017
#
malware
#
ddos
#
ransomware
90% of major Australian businesses and government agencies have been targeted by cyber attacks in the past year.
Thinkstockphotos 497906538

Firebox Cloud: Public cloud security for small and midsize businesses

Mon, 8th May 2017
#
malware
#
firewalls
#
network infrastructure
Small and midsize firms bolster cyber defences with Firebox Cloud, bringing enterprise-level security to the public cloud.
Trail blazer

EXCLUSIVE: Trends in the UC industry and how resellers can capitalise on them

Mon, 8th May 2017
#
uc
#
martech
#
ai
Recently we spoke with tech stalwart Randy McGraw on trends in the unified communications industry and just how the channel can capitalise on them.
Thinkstockphotos 672446342

Arbor Networks: Beware of headline risk with DDoS attacks

Fri, 5th May 2017
#
ddos
#
stock exchange
#
arbor networks
DDoS myths debunked: Arbor Networks stresses the danger of headline-induced misconceptions and the necessity for robust defence strategies.
Thinkstockphotos 623667596

Opinion: We take some brilliant tech for granted way too often

Thu, 4th May 2017
#
gaming
#
fintech
#
digital entertainment
From virtual reality marvels to instant mobile banking, our daily tech wonders deserve more appreciation as we cruise into an automated future.
Thinkstockphotos 479631160

Fake Chrome extensions inject code into web pages

Tue, 2nd May 2017
#
malware
#
digital entertainment
#
cybersecurity
Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected.
Thinkstockphotos 674757016

Carbon Black: How to set up a threat hunting program

Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.
Thinkstockphotos 545662400

When innocent mistakes turn into costly problems

Mon, 1st May 2017
#
endpoint protection
#
edr
#
hackers
70% of firms faced pricey security breaches due to compromised accounts, careless misuse, or malicious insiders—only 1% were unscathed.
Roi abutbul   from raw data to actionable intelligence the art and science of endpoint security

From raw data to actionable intelligence: The art and science of endpoint security

Fri, 28th Apr 2017
#
ai security
#
ai
#
microsoft
The endpoint is vulnerable. That's where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.
Thinkstockphotos 491324833

Young cybercriminals 'more motivated by peer respect than financial gain'

Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Thinkstockphotos 670632126

Unlocking the future of IoT: Five key areas to watch

Thu, 27th Apr 2017
#
ddos
#
data analytics
#
martech
Here are a few trends that make me hopeful that we're now entering a time when IoT deployments will be increasingly effective - and widespread.
Coding

Three key steps to making the most out of web investments

Thu, 27th Apr 2017
#
martech
#
cloud services
#
websites
Businesses need to be treating their corporate websites as ongoing investments, rather than 'build and forget' projects.
Thinkstockphotos 512691636

Carbon Black asks: So what exactly is threat hunting?

Wed, 26th Apr 2017
#
malware
#
semiconductors
#
cybersecurity
​Information security professionals used to put all of their chips towards incident prevention. This didn't work out very well.
Thinkstockphotos 655400970

Talend: The reality of the artificial intelligence revolution

Wed, 26th Apr 2017
#
robots
#
uc
#
martech
Talend's Jason Bissell demystifies AI, citing its growth in Asia and promising advancements in both daily life and scientific discovery.
Brainstorming

Why businesses need innovation to stay relevant, and how they can start

Mon, 24th Apr 2017
#
opinion
#
iofabric
In a world where innovation is key, businesses must ditch complacency and challenge the status quo to stay afloat.
Thinkstockphotos 642442154

Women in cybersecurity: Slowly but surely, change is coming

Mon, 24th Apr 2017
#
malware
#
cybersecurity
#
opinion
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.
Thinkstockphotos 475507032

Why stakeholder collaboration is key to your cloud success

Fri, 21st Apr 2017
#
devops
#
apm
#
cybersecurity
However, adoption of the cloud often starts with the infrastructure team and fails to bring other key teams along on the journey.