adv

Features

Supply chain attacks: be wary of third-party providers
Dec 6, 2017
A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your...
Jian Wang, Chairman of Technology Steering Committee, Alibaba Group
Dec 5, 2017
Jian Wang (pictured), chairman of technology steering committee of Alibaba Group and the mastermind of Alibaba Group's City Brain project, shared his insights with the Hong Kong...
5 tips for speeding up the IT hiring process
Dec 5, 2017
Tech skills are in high demand—and tech candidates with the hottest skills can land multiple job offers at once. If you’re looking to fill a tech skills gap at your business, you...
When threats get weird security solutions get weirder
Dec 4, 2017
The world of security is getting super weird. And the solutions may be even weirder than the threats.Some of the biggest companies in technology have been caught deliberately...
Wi-Fi standards explained and compared
Nov 29, 2017
In the world of wireless, the term Wi-Fi is synonymous with wireless access, even though the term Wi-Fi itself (and the Wi-Fi Alliance) is a group dedicated to interoperability...
Hacker steals log in password of social networks accounts (source: iStock)
Nov 28, 2017
If you thought 2017 was a dire year for data breaches, wait until 2018. The Information Security Forum (ISF), a global, independent information security body that focuses on cyber...
Little girl terrified by content shown on tablet (source: iStock)
Nov 27, 2017
As enterprises push ahead with mobile-first strategies –- and employee smartphones and tablets increasingly become business tools –- the importance of mobile threat defense (MTD)...
 It is time for enterprises to take a page out of their adversaries’ playbook by
Nov 24, 2017
With enterprises going through digital transformations that bring fresh technologies such as big data and IoT into their traditional IT infrastructure, protecting the network and...
Nov 24, 2017
The re-engineered version of Firefox called “Quantum” released last week not only claims to be twice as fast but it also packs some punch in the security department, according to...
Surgeons performing an operation with virtual reality (source: iStock)
Nov 24, 2017
What is virtual reality? The goal is to alter a human’s perception through virtual systems.Basically, the sensory information appears so realistic to the brain that it is tricked...