Home Tags #security

Tag: #security

Spammers an enterprise unto themselves

0
The business world operates according to many well-entrenched patterns. Work schedules are defined based on labour and customer demands; a majority of day-to-day business...

The future of encryption

1
What does a simultaneously dead and not-dead cat have to do with cybersecurity? Quite a bit, as it turns out. Schrödinger's quantum kitty is the...

CenturyLink takes Managed Security Services 2.0 to APAC

0
Not all markets are created equal; and not every sales approach will resonate with certain audiences. This was something that CenturyLink kept in mind...

McAfee expands machine learning, automation capabilities to strengthen human-machine teams

0
McAfee today released Disrupting the Disruptor, Art or Science?, a new report comparing the role of humans to automation and machine learning in the...

Held for Ransom and WannaCry

0
Ransomware is big business. In early May, the UK's National Health Service (NHS), along with hundreds of other organizations worldwide, was crippled by a massive...
Bridging iot

Information Builders talks next steps in leveraging IoT data

0
Presenters at the latest Information Builders breakfast seminar, Powering IoT with an Information Management Strategy, provided a comprehensive view of what it will take...

Secrets of a CISO – Defining the security leader’s development path

0
A newly-published InsightaaS Industry Brief delivers an insider’s view of the building of a CISO Of all the challenges facing corporate IT planners, development of...

SDN: networking in the cloud era

0
Cloud computing is a done deal. Virtually all organizations now use cloud in one form or another: the value proposition of SaaS is no...

Getting them young

0
We keep hearing that millennials want to work with tools that are familiar, as though that were something new. It's not. Everyone leans towards...

Kantara initiative joins European Trust Foundation

0
WAKEFIELD, Mass., USA – April 4, 2017 -- Kantara Initiative announced today that it joined the European Trust Foundation to help its non-European Union...

New tools for new breach reporting

0
Information professional professionals across the country have been considering the ramifications of new requirements in Canada’s Digital Privacy Act legislation slated to come into...

Fat fingers

1
When a large portion of the World Wide Web suddenly ceased to function recently, it was a wakeup call. Fifty-four of the top 100...

IoT security fundamentals: what risk, why care and who’s driving?

0
The glow surrounding IoT is beginning to fade as organizations come to face one of the key challenges in its implementation – the need...

Competition or cyber security co-opetition

0
Competitors in many industries quietly cooperate when it makes sense, even if it's only by establishing and adhering to standards. Just think what the...

Car clouds and data networks – the Ethernet game is on

0
Celebrated as a “data centre on wheels,” the modern car is more software than ‘hardware’, and kicks off an enormous amount of data that...