Articles Search Results

282 Articles and 0 related Products found for cyberattacks
  • Adopting a holistic approach to cybersecurity
    Cybersecurity is making its way to the forefront of every enterprise's agenda. Even for organizations where cybersecurity is not a priority,...
    Editor / Provider: Mark Fuentes, Senior CyberOps Consultant, Horangi Cyber Security | Updated: 2018 / 3 / 19
  • Encrypting data as cyberthreats grow
    Modern technology is continuously evolving. All our data is now transmitted through the internet and the need to protect our data is essenti...
    Editor / Provider: Lisa Hsu | Updated: 2018 / 3 / 15
  • IIoT in Asia: Challenges need to be resolved
    With IIoT, operators can rely on data generated by connected devices to make the production floor smarter than ever. Being the manufacturing...
    Editor / Provider: William Pao | Updated: 2018 / 3 / 8
  • TCO, ROI key in large enterprise video surveillance
    Firms and enterprises always look for ways to cut down on cost and achieve further savings. Providing a video surveillance solution that hel...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 3 / 6
  • How VoIP can enhance customer experience in banking
    In the banking sector, customer experience is king. As banks are opening more and more branches across the globe, providing great customer e...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 2 / 27
  • How security system providers react to the GDPR
    In the face of the GDPR, system providers need to incorporate the principles of both privacy by design and privacy by default into their pro...
    Editor / Provider: Sophie Wu | Updated: 2018 / 2 / 7
  • IIoT: Bringing OT and IT together
    What is IIOT? IIoT is all about data generated by industrial connected devices and integrated with IT to help operators achieve further effi...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 1 / 31