Asia's Source for Enterprise Network Knowledge

Wednesday, May 22nd, 2019

Wireless / Mobility

One in three organizations suffered data breaches due to mobile devices

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

New Verizon report shows a big gap between organizations' mobile security risk concerns and mobile security best practices they implement.

 

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

Wireless access

Cisco: By 2022, mobile will represent nearly 20 percent of all global IP traffic, fueled in part by the Internet of Things.

 

Huawei: We welcome security scrutiny

The CMO of Huawei's Wireless Network product line said that scrutiny is welcome as long as it's factual, and said that Britain's NCSC is a good example of how to create regional security standards

 

2019: The Dawn of 5G

Businesses need 5G networks for revolutionary increase in speed and capacity: report

Understanding and planning for the challenges and opportunities 5G will bring over the next couple of years will put organizations in good stead once the technology arrives in your market.

Q&A: Experian exec says biometrics won’t save you from mobile hacks

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Experian's annual data breach forecast predicts that biometric hacking will continue to surge as more mobile devices use fingerprint scans and Face ID technology to protect corporate and consumer data. But there are ways to avoid being hacked.

 

Cisco links wireless, wired worlds with new Catalyst 9000 switches

Commvault Software now enables Hadoop, Greenplum & GPFS big data environments

Cisco expand its wired family too with Catalyst switches for medium-sized businesses

 

Mobile Workspaces are Reinventing the Office

Mobility

The workplace of the future is transforming all aspects including how we consume, transact and share data and manage workflows in the organisation, to create a digital workplace which is flexible, mobile and exists as much on our own terms, time and space as it does in the office.

12 things every IT security professional should know

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

 

ConnecTechAsia successful in bridging the digital divide for governments, cities and enterprises with showcase of latest tech and trends

ConnecTechAsia, the inaugural mega technology event comprising BroadcastAsia, CommunicAsia and the new NXTAsia wrapped up last week after an exciting three days of exhibitions and a summit covering the latest innovations in cloud, blockchain, AI, VR/AR, IoT, robotics, 5G, IP broadcasting, OTT and smart cities, among others.

Apple bans cryptocurrency mining apps on iOS to protect mobile users

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Apple has created new rules for app developers that ban the creation of cryptocurrency mining services on mobile devices.