Contributor's stories - Page 7
When innocent mistakes turn into costly problems
While S&R professionals often think “outside-in” first when assessing threats, awareness of internal threats can also be a key requirement.
From raw data to actionable intelligence: The art and science of endpoint security
The endpoint is vulnerable. That’s where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.
Amazon Web Services / AWS
Harnessing a AWS hybrid cloud architecture in the digital payments ecosystem
some organisations are hesitant to put 100% of their applications in the cloud, either for security reasons or because few digital payments applicatio
Young cybercriminals ‘more motivated by peer respect than financial gain’
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Unlocking the future of IoT: Five key areas to watch
Here are a few trends that make me hopeful that we’re now entering a time when IoT deployments will be increasingly effective - and widespread.
Equinix: Localise and optimise traffic at the digital edge
The digital edge - This is the place where information is exchanged, transactions are conducted, and data is gathered and analysed.
Three key steps to making the most out of web investments
Businesses need to be treating their corporate websites as ongoing investments, rather than ‘build and forget’ projects.
Why silos belong on the farm, not in the data centre
Silos are great for the farm, but totally unsuitable for the new enterprises’ storage and data requirements.
Carbon Black asks: So what exactly is threat hunting?
Information security professionals used to put all of their chips towards incident prevention. This didn’t work out very well.
How sustainability, DCIM and the Open Compute Project present opportunity for colocation providers
Every company can take steps to reduce its energy consumption – and should for competitive reasons.
Artificial Intelligence / AI
Talend: The reality of the artificial intelligence revolution
Robots assuming complete control of society is unlikely; nuances of perception, intuition, and plain old “gut-check reactions” still elude machines.
Dicker Data New Zealand
You're invited: Dicker Data to host 'truly memorable' Cloud Festival
There won't be any death by Powerpoint at Dicker Data's Cloud Festival, with the distributor instead promising powerful triumphs and amazing insights.
Protecting your client’s digital assets in the public cloud
Ingram Micro’s Andrew Khan explains how Fortinet’s security fabric protects your client’s public cloud-based and in-house digital assets.
What the channel needs to know about cloud security
Cloud computing fundamentally changes how we think about cyber security. Trend Micro’s Peter Hewett outlines what that means for resellers.
Why businesses need innovation to stay relevant, and how they can start
Innovation is not simply about financial benefits, it is about gaining a competitive advantage.
Women in cybersecurity: Slowly but surely, change is coming
“More people are realising what a solid, secure and interesting career choice it is."
Data Centre Cooling
How hybrid cars point the way to increased data center cooling efficiency
Reducing demand on the engine means it doesn’t have to be as large as in a traditional car, and thus operates more efficiently.
How colocation providers are dealing with customer demands
“We’re seeing a proliferation of devices that are going to generate a massive amount of data, so yes, it is something real."
Why stakeholder collaboration is key to your cloud success
However, adoption of the cloud often starts with the infrastructure team and fails to bring other key teams along on the journey.
Zerto A/NZ: Why hybrid cloud?
If you are considering a move towards a hybrid cloud environment, what should you consider and how do you get there?
Modernize or Outsource: Evaluating the options for your data center
Each data center is somewhat different and the approach to modernization could vary depending upon the individual circumstances.
Around 17 million websites are already powered by WordPress - are they secure?
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Perfect storm warning: Look out for dramatic storage changes
This year will see the perfect storm across the storage industry, says ioFabric’s Greg Wyman. He outlines why and what it means for the market.
Why a VPN is essential in Australia after the Metadata Retention Law
Use a VPN to protect yourself from the repercussions of the new data retention laws in Australia.