Malaysian govt working to battle digital piracy
The minister stated that the Communications and Multimedia Ministry would meet the stakeholders and interested parties to develop a holistic and comprehensive solution.
How Magic Video, A Fastest Growing Video Platform, Improves UX Through Application Acceleration?
Magic Video realizes that with more companies building cutting-edge digital products to reach larger audiences, it must stay ahead of the competition. Explore how they plan to do this in this whitepaper.
How Alibaba Cloud’s Express Connect Helps Enterprises Build Dedicated Connections Between Different Cloud Environments?
Secure connections, long distances, high latency, high-bandwidth networks, low availability and packet loss and myriads of compliance – these critical issues are the core to the survival of companies in the digital world.
Philippines launches its National ICT Ecosystem Framework
The National ICT Ecosystem Framework is a central consolidating framework for the process of ICT policy formulation and governance.
New funding to boost Australian medical tech innovations
The A$ 22.3 million Biomedical Translation Bridge program brings national reach, industry capabilities, and expertise and commercial know-how to the task of boosting translation of Australia’s health-tech research.
Hong Kong Secretary for IT stresses the importance of cybersecurity
It was noted that the government will continue to strive to enhance the safety of the community, protect personal privacy, and provide appropriate professional support to local enterprises to provide a safe and secure network environment for the community.
India could be a trillion dollar digital economy by 2025
India could see a five-fold increase in economic value through digital transformation in 2025, by representing opportunities for global and local businesses, start-ups, and innovators to invest in emerging technologies.
Thai banks to apply facial recognition tech for KYC
IDC report reveals that Thailand’s IT spending will grow by 6.5% to reach 451 billion baht as enterprises continue to invest in advanced technologies, banks invest in fintech and e-Know Your Customer tech.
CSIRO’s new tool to protect Australians against infectious diseases
The tool identifies and tracks new cases of infection to their original source in Australia and links how the disease has transferred between people by drawing on multiple incomplete datasets and combining them.
Borderless security engineered for your elastic hybrid cloud
Any data which interacts with people, which is after all its main function as an organizational asset, is exposed to the effects of human error, and potentially of human malefactors. Hosted cloud service providers are responsible for the security of the environment they provide, but responsibility for the internal security of each workload remains firmly with the organisation.
Mobile Number Portability Act of the Philippines to empower subscribers
Mobile Number Portability Act allows the consumers to keep their mobile numbers for life even if they switch service providers or change their subscription.
Increase the Effectiveness of Existing Cybersecurity Tools
Enterprises have invested a fortune in cybersecurity tools developed by some of the best minds in technology. Yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features. It’s not that IT organizations are lazy or apathetic about security. […]
Gigamon Helps Government Agency Meet Cybersecurity Requirements
A combination of highly skilled experts and a rapid response system can help to monitor and respond to the potential impact on resources, the possible loss or destruction of healthcare related and privacy information, in addition to the potential loss of productivity and reputation damage.
Inline Bypass: Scaling Inline Threat Prevention Tools to Keep Pace with High-Speed Networks
Increasing network data rates and consequent network upgrades have major repercussions for security administrators, especially those who rely on best-of-breed inline threat prevention tools. These tools simply can’t keep pace with faster networks. As a result, the risk of attack rises, which in turn, can nullify the investment and business benefit of high-speed networks.
SSL/TLS Decryption
GigaSMART SSL/TLS Decryption is a licensed application that enables SecOps teams to obtain automatic visibility into SSL traffic regardless of TCP port or application.
Network Security Solutions for Government Agencies
Public sector IT leaders now face the mandate of closing existing gaps in their network infrastructure and aligning their cybersecurity practices with the latest compliance and regulatory standards.
Security at the Speed of Your Network
The growing volume of data on faster networks is surpassing the capacity and performance of monitoring and security tools, creating a major gap between the data flowing through an organization and the ability of security tools to process that data in a given time.
What Do You Mean TLS 1.3 Might Degrade My Security?
Transport Layer Security (TLS), formerly known as SSL, has become the de facto way of encrypting data in motion on networks. Unfortunately, several serious attacks have affected TLS over the past few years, and malware increasingly uses SSL/TLS sessions to hide, confident that security tools will neither inspect nor block its traffic. The very technology […]
Compendium on Digital India: Digital Infrastructure
Under Digital India, a key vision area is to provide digital infrastructure as a utility to every citizen, starting from delivering digital identities to 1.3 billion citizens, linking about 250,000 village council through optical fibres.
Waterproof drone recognised for its abilities
Black Kite can contribute to maritime applications since it is entirely water-proof, has the capability to land and take-off on water, and was designed to operate with high levels of autonomy in taking off, intercepting and tracking targets, returning to base and landing.
Sydney Airport to establish cyber security centre
[vc_row][vc_column][vc_column_text]Sydney Airport is preparing to open a new 24/7 Security Operations Center (SOC) to mitigate the growing risk of data and information security threats. The airport announced in its annual report the first phase of the SOC – Security Control Centre would be complete by April 2019. It highlighted cyber-attacks as a key operational risk […]
Malaysia tech development supported by new business advisory network
The business advisory network is a framework to further boost collaboration between the two countries, particularly in the fields in technology and ICT.
Indonesian state companies to merge mobile payment services
LinkAja will tap into Indonesia’s rapidly growing digital payments market. With around 91% of Indonesia’s 264 million population owning a mobile phone, the country has become an attractive market for digital payments.
7 Signs You Have Outgrown Excel
At the core of Qlik Sense Cloud is Qlik’s associative model, which automatically associates internal and external data sets – enabling you to uncover hidden connections that lead to deep insights and better business decisions.
10 Trends for BI – Discover the Future of Data
The “post-fact era” – a new age where data and facts lose their credibility, and where information that doesn’t support one’s existing beliefs is immediately disregarded. There’s only one way to fight the post-fact era. We need to turn the tide on information overload and arm more people with the power of data.
10 Ways to Transform Big Data into Big Value
Big data is a big deal – more than half of enterprises globally view Big Data as an opportunity and plan to increase their investments in Big Data in the next few years.
Driving Predictive Maintenance in a Connected World: IoT-Enabled Predictive Maintenance
Today, IoT and connected devices are essentially re-shaping the predictive maintenance landscape. By capturing and utilizing data streaming from sensors and connected devices, businesses can now gain visibility into the condition of their valuable assets and specific components in real time.
2016 Big Data Maturity Survey
With answers from over 2,550 participants worldwide, this survey is the first global and industry’s largest study on Big Data Maturity.
Working With Images and Videos At Scale: Solutions for Law Enforcement
The Cloudera platform simplifies the management of distributed computing resources, such that piXserve can carry out its calculations where the data is stored.
Computational Simulation: The Next Frontier for Better Decision Making
Explore how various platforms can be combined with the power of the Cloudera modern data platform to provide policy makers, regulators, and other key players in the financial services sector with the necessary toolkit to understand the modern financial sector.