<
>

DATTO: Not All Business Continuity Is Created Equal

By Nop Srinara, Director, Datto Asia   When a system goes down, getting back up and running quickly should always be the key priority, helping you to minimise the potential impact that downtime can have on your...

Threat Graphs: The Old World Statistics Model as a Weapon Against New World Cyber Security Issues

Graph databases are not new. They have been around since the 1960s and work on the basis of storing independent objects and adding dependencies between them. They are not rigid and can adapt as dependencies emerge and...

IT Transformation Puts New Demands Uptime

The driver for IT transformation is not new tech for technologies sake. It is being driven by another transformation happening at the business level. Digital transformation is the modern-day business imperative that demands IT...

How Fast Can Your Computer Security Team Respond to a Threat?

Whenever our systems are compromised, cybersecurity programs are the first to detect the threats. They will then try to fix the problem and send a threat notification to the team of IT technicians. But at the same time,...

Three Steps to An Agile Data Centre

The data centre has always been the hub and foundation of corporate IT, however in today's climate of constant business and transformation the traditional "bricks and mortar" hardware centric data centre can end up...

Tracking Threats in Organisations

While most companies continue their digital transformation, the threat of falling victim to cybercriminals will always be there. Before the era of digitalisation, the only threats companies faced were financial losses and having...