Asia's Source for Enterprise Network Knowledge

Monday, May 27th, 2019


3 reasons cybercriminals ‘strategically’ target companies: report


In 2018, extortion attempts will likely to target organisations trying to comply with new EU privacy laws

Microsoft and Lenovo deepen strategic ties across devices

BlackBerry will attempt its last hurrah with a pair of mid-range smartphones

Lenovo expects to ship millions of these Android-based devices worldwide over the next several years

Panama Papers: Soon searchable by the public thanks to the cloud

Contents aside, the technical aspects of the related investigations, involving 2.6 terabytes of data -- 11.5 million documents! -- are intriguing. How did journalists manage, organize and analyze this huge amount of data?

Tim Cook says Apple will oppose court order rather than hack customers

A court in California ordered Apple to assist the FBI to crack an iPhone

APAC countries slow to produce comprehensive national cybersecurity strategies


New study finds that Asia-Pacific countries have been slow to produce comprehensive national cybersecurity strategies, and implement the necessary legal frameworks for security and critical infrastructure protection.

Half of organizations targets of cyberattack in last year

About half of global organizations have suffered a cyberattack in the last year, said a report released on Tuesday by the Information Security Media Group and Bit9.Ã'Â

Almost two-thirds of the organizations that acknowledged they'd been attacked (65 percent) said the events resulted in business disruptions -- employee or system downtime. And 19 percent lost data to a cyber assault, said the report.

Four keys to successful BYOD

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
The bring your own device (BYOD) movement formally advocates use of personal equipment for work and obligates IT to ensure jobs can be performed with an acceptable level of security, but how can risks be addressed given the range of devices used and the fact that you lack control of the end point?
Companies looking to embrace BYOD -- 44% of fir

How to protect your intellectual property in the cloud

Around this time last year, the cloud computing contract signings were coming fast and furious -- not just for commodity work like IT management or email, but for software and infrastructure closer to the core of corporate value.

Mozilla releases version 2.0 of its license

Mozilla announced Tuesday the release of version 2.0 of the Mozilla Public License (MPL), which provides compatibility with the Apache and GPL licenses, opening up a wider body of code for reuse by the Mozilla project.

The new license like its is predecessor MPL 1.1 is a file-level copyleft license, that allows users to create projects that combine MPL licensed code with code under other open or proprietary licenses.


Report: Indian court orders 22 websites to remove offensive content

A court in Delhi on Saturday ordered 22 Internet companies, including Google and Facebook, to remove certain "anti-religious" and "anti-social" content, the Press Trust of India news agency reported.

India has been concerned recently about online content that it considers objectionable, with the country's Minister for Communications and IT, Kapil Sibal, calling on Internet companies to develop a framework to ensure that such content does not appear online.