Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Hidden cloud migration gotchas — and how to avoid them

From a lack of visibility into infrastructure to licensing and governance issues, frustrating surprises await your migration to the cloud. Here’s a real-world look at how traditional companies are navigating the cloud’s less-documented challenges.

Awareness training: How much is too much?

Security awareness training is one of the most effective ways to strengthen what is generally known as “the weakest link in the security chain.” The key is to make employees skeptical without paralyzing them with paranoia

TECHNOLOGY

APPLICATIONS

City of Chicago develops big data platform to improve the lives of citizens

The app built on MongoDB adds a vast range of data sources such as 911 calls and building licenses to an interactive map.

CLOUD COMPUTING

Hidden cloud migration gotchas — and how to avoid them

From a lack of visibility into infrastructure to licensing and governance issues, frustrating surprises await your migration to the cloud. Here’s a real-world look at how traditional companies are navigating the cloud’s less-documented challenges.

COMPUTER HARDWARE

Start-up Spotlight - Meet the emerging tech businesses of Australia

DATA CENTRE

Australian defence dept. said to divorce Global Switch over Chinese stake

Reports of plans to take back control of classified data stored in Sydney.

EMERGING TECHNOLOGY

Are SMEs the vital keys to nudge Malaysia’s Digital Economy to 20% GDP goal?

With Malaysia's Digital Economy now accounting for more than 17% of GDP, Malaysian Government agencies such as MDEC, MITI, and SME Corp are calling on VCs and GLCs to play a more aggressive role.

INDUSTRIES

Google's research chief questions value of 'Explainable AI'

Peter Norvig says output of machine learning systems a more useful probe for fairness.

INTERNET

New social media scams: Can you tell friend from foe?

Scams on social networks are nothing new, but they're constantly changing to take advantage of the latest apps, trends and news. As with all social engineering scams, the best defense is a skeptical user.

MOBILE

The smartphone options to boost adoption

Gartner says 5G, AI and behavioural biometrics on smartphones will further fuel its adoption.

NETWORKING

Tools that increase IT efficiency pave the way for digital transformations

Enterprise favorites save time and resources.

OPERATING SYSTEMS

5 things you need to know about Stack Clash to secure your shared Linux environment

Attackers can locally exploit the privilege escalation vulnerability to gain root access over Linux, Solaris and BSD machines. This is bad news for Unix-based servers, and even more so for multi-tenant environments.

SECURITY

Malware your own business is back in time for EOFY

Accounting company MYOB impersonated by cyber crooks, again.

STORAGE

Toshiba board picks top buyer for storage business

Bain Capital-lead consortium named as front runner, but still needs shareholder approval.

RELATED WHITE PAPERS

BLOGS

Privacy, cybercrime and the law in a post-ransomware world

In an age where data has become a valuable commodity that is the object of cybercrime, organisations and cybersecurity professionals must work within applicable legal frameworks in preventing, detecting and responding to cybercrime and cyber-attacks.

myGov update fails on promises and potential

Even after a revamp, myGov is failing to live up to its potential.

RELATED WHITE PAPERS