Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

SECURITY HARDWARE AND SOFTWARE NEWS

How can you know if your phone has been compromised?

Feb. 5, 2016 | PARVINDER WALIA, SALES & MARKETING DIRECTOR, ESET APAC

Without proper security measures, users risk losing both their personal data and confidential data from work once their mobile device is compromised. In light of this, Parvinder Walia, Sales and Marketing Director at ESET, Asia Pacific, shares 5 things to look out for in order to find out if your phone has been compromised.

Read more...

Top five reasons exploit kits are more dangerous than you think

Feb. 5, 2016 | KEN POHNIMAN, GENERAL MANAGER ASEAN, INFOBLOX

Exploit kit use is on the rise again as indicated by the latest Infoblox DNS Threat Index report which shows a 75% increase in exploit kit related activity in Q3 2015, compared to the same quarter in 2014. Here we look at five reasons why exploit kits are a highly dangerous cyber threat.

Read more...

BLOGS AND OPINIONS

SECURITY HARDWARE AND SOFTWARE WHITE PAPERS

Transforming organizational culture with PaaS

Red Hat

IT changes fast, but organizational culture, processes, and policies change much more slowly. This paper explores the role of OpenShift by Red Hat in creating an atmosphere where IT leaders can truly benefit from DevOps or agile methodologies.

Download

Optimize applications with IBM DB2 and IBM FlashSystem

IBM

This white paper explains why storage I/O performance is often the biggest bottleneck in data centers and discusses which database components can be targeted for migration to FlashSystem. It also provides potential improvement metrics with flash compared to HDDs based on several use cases.

Download

MULTIMEDIA