Why There Need to Be A Container of Alizé in Your Refrigerator Right NowYou keep in mind, Alizé, right? That neon yellow (or “bleu”) liquor in the clear glass container with the seductive, scripted red font style? Name dropped by rap artists like Tupac Shakur, Big Deal, and also Dr. Dre; it was ubiquitous in […]
Browsing Category: Article
These are 4 questions you need to consider after a data breach
In the EU, GDPR is requiring organisations to disclose data breaches within 72 hours in an effort to protect personal data. Other areas of the world – notably the US – are also considering ways to introduce regulations that compel companies to disclose data breaches sooner. In Singapore, the Personal Data Protection Commission (PDPC) plans to introduce revisions […]
The new dynamics in the NetOps-DevOps collaboration
F5 research a couple of years ago highlighted how NetOps and DevOps respect each other’s priorities and their common understanding of broader goals. This has given hope for increased collaboration between the teams. Indeed, the survey results point to their rising interest in automation and self-service that can be linked to the rapid adoption of […]
The state of cloud computing in Southeast Asia
Cloud computing (or simply ‘the cloud’) has now long been established as a core technology that signals a shift from the traditional, legacy way of operating – and it’s still growing. A compelling reason to shift at least some of your operations to the cloud is the ability to better allocate resources based on business […]
Humans cause nine out of ten data breaches in the cloud
Incidents in public cloud infrastructure are more likely to happen because of a customer’s employees rather than actions carried out by cloud providers, according to a new Kaspersky Lab report –‘Understanding security of the cloud: from adoption benefits to threats and concerns’. Companies expect cloud providers to be responsible for the safety of data stored […]
Red Hat and Microsoft launch Azure Red Hat OpenShift
Red Hat, Inc. and Microsoft have announced the general availability of Azure Red Hat OpenShift, which brings a jointly-managed enterprise-grade Kubernetes solution to a leading public cloud, Microsoft Azure. Azure Red Hat OpenShift provides an on-ramp to hybrid cloud computing, enabling IT organizations to use Red Hat OpenShift Container Platform in their datacenters and more […]
Dell EMC advances server portfolio: Page 2 of 2
Enhanced Security Scale data protection and streamline management of self-encrypting drives with new OpenManage Secure Enterprise Key Manager. This enables customers to centrally manage keys for self-encrypting drives to better secure data at both the drive and server level. New OpenManage FlexSelect Secure capability gives customers the flexibility to adapt and scale their security solutions […]
Command and control traffic: How to stop the threat
When you’re defending a network, an essential piece of keeping threat actors out is denying access. If the bad guys are stuck on the outside, they will remain unable to accomplish their nefarious goals, whether it is theft of data, its destruction or espionage. Attackers have begun utilizing multiple command and control (C&C) systems to […]
Artificial intelligence enhances security with a human touch
A security company might seem like an improbable early adopter of artificial intelligence (AI) technologies. The sector has traditionally relied solely on security officers to watch over malls, banks, housing, public transport, and educational institutions. But that is changing as Singapore-based Certis takes a leading role in adopting AI solutions to transform its business model […]
Microsoft smartens up Azure Cognitive Services
Microsoft is introducing new artificial intelligence capabilities for developers on the company’s Azure cloud platform. An enhancement to Azure Cognitive Services, called “Decision,” provides user-specific recommendations for better decision-making. Azure Cognitive Services is a collection of APIs to intelligent algorithms that developers can tap to perform image recognition, speech recognition, natural language processing, anomaly detection, and […]