With the diversity and quantity of online financial threats increasing, recent research from Kaspersky Lab and B2B International has found that 48% of consumers have been targeted by scams designed to defraud and trick them into revealing sensitive and financial information for criminal gain.
It’s a wireless world, of course, and one only likely to get less dependent on physical connectivity in the future – but what that future looks like will depend a lot on the companies exerting the strongest influence on the industry. We...
AccorHotels has upgraded its Wi-Fi technology and infrastructure to help ensure high performance for both customers and hotels, enable future developments, and intensify the strength of its digital services. With a presence in over 90...
Data science is a hot new industry, but what skills and background do you need to break into the field? Essentially, data science, data engineering and data analytics are broad -- and sometimes ambiguous -- terms that describe a litany of skills and...
Cloud security is more important than ever. In fact, cloud-based solutions are not just more flexible, scalable and dynamic providing both short-term and long-term IT resources, but are also inherently more secure—enabling greater practical...
Microsoft this week reached deep into its coffers and made a massive bet on social media in the enterprise. The company says LinkedIn, which it purchased for $26.2 billion, will be a semi-autonomous entity under its ownership, but LinkedIn data will...
Avaya has introduced its concept of Digital Transformation-as-a-Service – SmartDXaaS – for the Asia-Pacific region. Speaking at the start of the annual Avaya Technology Forum in Bangkok, the first in a series of events that will also be...
Cisco’s entrance into the data center analytics market with the introduction of Tetration is the culmination of two years worth of wrangling various open source projects and developing proprietary algorithms in the areas of big data, streaming...
Because there are so many different kinds of third parties, identifying whether they do or don’t have the right infrastructure or security protocols can be a challenge. Moreover, doing the proper due diligence needed to vet third-party...