Tuesday, 17th September 2019
Logo
BLOG

Public Wi-Fi - is it secure enough?

While many of people use Wi-Fi when they are out an about, there is much precautionary advice about using unsecured public Wi-Fi, which could allow a hacker sitting either a few yards away from them, or even miles away to gain access to their laptops, tablets and smartphones to steal passwords and sensitive data. By Michael Wakley, CEO of LeakSafe.

Read More

VIDEO

Bali Government Implementing Cisco Data Center & Cisco Meraki

Cisco Hyperflex and Cisco Meraki bolster up the plan designed by the government of Badung Regency to build a smart city.

Read More

BLOG

Big data and the risks associated with not investing in the right protection

Organisations are driven by big data today – be that personal data, web data or transactional data. Combined, big data provides companies with the information needed to make informed decisions, such as staying on top of trends, targeting customers effectively, providing solutions to problems or analysing insights. So, when data is breached or hacked, it causes major problems both at an operational and at a financial level – and, in fact, if it is not addressed quickly and competently, has the po...

Read More

BLOG

Aircraft maintenance data: a revolution in waiting?

Over the years, advancements in technology have been such that the ability to monitor, record, stream and analyse in-flight data has developed at a rapid rate. By Chris Knight, Senior Associate, Pillsbury Winthrop Shaw Pittman.

Read More

BLOG

7 Ways TAPs Enable Enhanced Network Monitoring and Visibility

Corporate networks are being forced to reckon with amplified levels of traffic as technology changes and advances. In addition to monitoring and fortifying the network against possible cyberattacks, IT departments have to factor in the growing use of personal devices in the workplace, and third-party applications for business management. Having the ability to access network traffic is an important component, but it’s only the first step in keeping your network secure. You also need to make sure...

Read More

VIDEO

Seattle Proton Therapy Keeps Patient Data Safe and Available

Seattle Proton Therapy turned to Dell EMC Data Protection to solve an immediate capacity need for backing up their patients’ medical records while complying with government regulations like HIPAA. They found the Dell EMC IDPA DP4400 appliance easy to deploy, with a minimal learning curve for their admins. With excellent deduplication, they continue to save space, and they’ve reduced the time to access crucial data from 1 to 2 weeks to a matter of minutes.

Read More

VIDEO

Time to innovate with FUJITSU Integrated System PRIMEFLEX

Learn how Fujitsu Integrated System PRIMEFLEX helps you reduce deployment, operational and maintance cost in your data center.

Read More

BLOG

Apps: the gateway to your private data

Cybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications like Telegram and social media platforms to trade valuable personally identifiable data (PII) such as stolen payment card details. By Terry Ray, SVP, Imperva.

Read More

BLOG

The implications of integrating facial authentication to protect customer data

Identity theft has become a major problem. It has steadily escalated globally as the need for digital identities continues to rise. In the UK, it was reported that 174,523 cases of fraudulent activity were identity fraud, with 95% involving the impersonation of someone else, and eight out of ten fraudulent applications were made online. By Steve Cook, VP of business development of EMEA at FaceTec.

Read More

BLOG

Seven pillars for constructing a modern data centre network

Designing and deploying a new or modernised data centre is a rewarding endeavour; both for the engineers and architects, and also for the businesses that reap the benefits of agility, scalability, and performance that come along with it. By JR Rivers, Co-founder and CTO, Cumulus Networks.

Read More