A decade on from the launch of Amazon Web Services (AWS), the cloud market is continuing to evolve quickly. What was once seen as a toy for test and development purposes now hosts mission-critical workloads for some of the largest companies in the...
Back in 2014, Intel declared it wanted laptops to be free of wires, and a centerpiece of that plan was wireless charging. But the technology has been slow to mature, and it may be years before it takes off. At CES, Dell showed a wireless charging...
Security researchers have found a new ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payment model. The malware has targeted Russian-speaking users so far, but its...
Destructive DDoS IOT attacks will rise. In 2016, Mirai showed the massive destructive potential of DDoS attacks as a result of insecure consumer IoT (Internet of Things) devices. Mirai's attacks exploited only a small number of devices and...
CyberSource announced a collaboration with China Southern Airlines Corporation Limited (China Southern), the largest airline in Asia in terms of fleet size. This agreement will enable China Southern to provide its customers with a streamlined online...
Cyber-attacks using the VoIP protocol Session Initiation Protocol (SIP) have been growing this year accounting for over 51% of the security event activity analyzed in the last 12 months, according to a report from IBM’s Security...
HDS released its key Business and Technology Trends for Asia Pacific in 2017 and according to Hubert Yoshida, chief technology officer of Hitachi Data Systems and Russell Skingsley, chief technology officer of Hitachi Data Systems Asia Pacific,...
Our organization, like most large public bodies, is locked into formal bureaucratic procedures and, by general standards, is highly risk-averse. In addition, like other organizations of the United Nations System, it has a unique attribute which...