<
>

Ransomware Still Going Strong: Here’s What You Need to Know to Fend Off This Epidemic

The global ransomware outbreak in 2017 caught a lot of public attention and the frequent media coverage has helped create awareness on the dangers of ransomware. For many organisations, it became a wakeup call for them to...

Exploring Alibaba Cloud - A Real Business Option?

Connectivity is key in today’s digital age. Organisations rely heavily on cloud technology today to keep their businesses at the tip of their fingers. Be it public, private or even hybrid, the cloud has become the most...

How Do Graph Databases Analyse Data?

Analysing security data is critical as it helps organisations have better visibility of their environment. It is important to be able to track and store the interaction of users, machines, applications, network communications,...

Traditional vs New Data: the old way of backup & recovery no longer works

By Gary Lim, Director, System Engineering, Commvault     It used to be that backup and recovery was just a simple process of copying files to tape, and storing them somewhere safe. At its core, that's...

Is your organisation at risk to a cyberattack?

Authored by: Jerry Tng, Vice President APAC, Ivanti Data privacy is commonly linked with users’ awareness of data hazards, yet it is also important to be aware of the importance of securing the growing multitude...

Modern data protection in the modern data centre

As data centres modernise and evolve, one thing continues to hold true, the amount of data created and stored is continuing to grow exponentially. Protecting large amounts of data requires similar modernisation to backup...

DATTO: Not All Business Continuity Is Created Equal

By Nop Srinara, Director, Datto Asia   When a system goes down, getting back up and running quickly should always be the key priority, helping you to minimise the potential impact that downtime can have on your...

Threat Graphs: The Old World Statistics Model as a Weapon Against New World Cyber Security Issues

Graph databases are not new. They have been around since the 1960s and work on the basis of storing independent objects and adding dependencies between them. They are not rigid and can adapt as dependencies emerge and...

IT Transformation Puts New Demands Uptime

The driver for IT transformation is not new tech for technologies sake. It is being driven by another transformation happening at the business level. Digital transformation is the modern-day business imperative that demands IT...

How Fast Can Your Computer Security Team Respond to a Threat?

Whenever our systems are compromised, cybersecurity programs are the first to detect the threats. They will then try to fix the problem and send a threat notification to the team of IT technicians. But at the same time,...