Risking security for an easy life: people’s password dilemmas revealed Weak and Memorable vs ‘So Secure I Forgot it’ Today we log into online accounts all the time – from transferring money between bank accounts, to simply ordering some shopping,…
SWITCH 2017 empowers innovators and influencers to create for a better world
SWITCH 2017 empowers innovators and influencers to create for a better world Asia’s leading plug and play platform kicks off with announcements aimed at boosting start-up and innovation growth in Singapore; and fervent discussions around a tech-enhanced world Singapore,…
Why hardware configurations could be the downfall of the IoT
Why hardware configurations could be the downfall of the IoT The Internet of Things is opening up new opportunities for businesses as well as introducing a new era of convenience for consumers. And it’s happening sooner rather than later: More than 24 billion IoT devices…
Malware, data theft, and scams: researchers expose risks of free livestreaming websites
Malware, data theft, and scams: researchers expose risks of free livestreaming websites Millions of people use free livestreaming websites to watch sports and other live events online, but this comes with a considerable security risk. Researchers from KU Leuven-iMinds (Belgium)…
Red Hat Enterprise Virtualization 3.6 Offers Improved Performance, Scale and Security for High-Performance Linux-based Workloads
Red Hat Enterprise Virtualization 3.6 Offers Improved Performance, Scale and Security for High-Performance Linux-based Workloads Latest release creates easier, more cost-effective path for users migrating from vSphere workloads Hong Kong – 30 March 2016 – Red Hat, Inc. (NYSE: RHT),…
Disaster recovery in the cloud – is it necessary?
Disaster recovery in the cloud – is it necessary? Mark Bentkower, CISSP, Director of Systems Engineering, ASEAN, Commvault Disaster recovery in the cloud? Are you a sceptic? Businesses in the Asia/Pacific region may have been more gradual in adopting cloud…