Data Breach Reporting: A Job Killer or Business Saver?
There’s quite a brouhaha bubbling up Down Under.It all stems from a Sydney Morning Herald opinion piece written by the…
Answer to OTP Bypass: Out-of-Band Two-Factor Authentication
Trend Micro’s one-time password (OTP)-based two-factor authentication bypass report (PDF) is hardly news to those in the tech world, but…
Signs Your Technology Is Outdated
It’s no secret that your customers and employees want an innovative experience with your company’s technology. Outdated technology can seriously…
Big Data Analytics: 80/20 Rule Isn’t Good Enough
The other day I was speaking with one of the top three global wireless CEO’s about big data. He said…
How Machine Learning Is Improving Computer Security
If there’s one thing that keeps business leaders awake at night, it’s worries over data security. Nowadays, every company no…
New Underground Data Center Trend Takes Hold
Recently, data center operators have been looking for new ways to establish computing facilities. One such example is the July…
BYOD: Industry Experts Pick Their Top Advantages
Bring your own device – better known as BYOD – is big business.Here we ask three respected industry experts what advantages they…
Microsoft Adds Azure Features, Enhancements and Partnerships
The Microsoft PR crew has been working overtime given the overwhelming amount of public announcements that has originated from the…
6 Crucial Data Security Lessons the U.S. Can Learn from Other Countries
Silicon Valley may have led the digital revolution, but Washington shows few signs of adapting to the times. As a…
Will Hyperscale Networking Shake Up the Data Center?
Even as physical data center facilities have gotten larger, the trend inside them is to make everything smaller, faster and…