Facebook iconTwitter icon
B2B-Network:
Practical Advice
4 Measurements to protect your business from ransomware attacks
Thumb ransomware3

Ransomware has been a dangerous threat to many small and large businesses for over six years now. Unfortunately, this type of cybercrime isn’t going away, but it can be prevented. Here are some tips on how you can protect your business from ransomware attacks. 

 

1. Update your computer system regularly

Cyber criminals usually find it easier to attack older versions of operating systems and browsers. However, if you keep all your business computers constantly updated, hackers will be less prepared to attack them as they won’t be able to figure out how to compromise the...

» Read more
Trend
Our cities are about to get a whole lot smarter
Thumb stadt

We've already got smart cars and smart appliances so it's logical that the next step should be smart cities. Indeed, there's already an example of one, Kansas City in the U.S. But what exactly does a smart city entail?

Essentially, it's a city that gathers information and uses communication technology for slicker operations, sharing information with the public, and improving services and safety on a number of levels. 
 

Increased economic growth and a higher standard of living

The ultimate goal of smart cities is to optimise city functions with the desired effect...

» Read more
Comment
The three main benefits of edge analytics 
Thumb analyse

Edge analytics is a rapidly evolving approach to cyber security and data collection that is being put to use across a range of industries. Instead of data being sent back to a centralised data store, edge analytics involves an automatic analytical computation via a network switch, sensor or another type of device, which is situated close to the devices generating the data. 

The advantages of this shift are threefold:

 

1. A more effective way of detecting and acting upon threats to cyber security

Edge analytics works by allowing IT to have a faster understanding of the real-time...

» Read more
Study
The Revolution of IoT
Thumb arbeiten

Internet of things (IoT) is expected to take a significant turn in its growth in the next 3 years. Following IoT Developer Survey 2015-2016 many executives are aware of this looming revolution and a few of them have made strategies on how to keep their businesses relevant. Some of the key IoT developer trends that were found in 2017's survey are:

 

1. Security

Security remains to be the key concern with 46.7% respondents admitting that it remains a major disquiet. Business security has been compromised on various occasions with the ever rising cases of malware attack....

» Read more
Trend
Top Things To Worry About In 2017
Thumb studie header

Like most previous years, there are a number of things that you should be concerned about in 2017. By knowing this information early, you can prepare yourself for what is to come:

Oracle
As most of us know, Oracle love purchasing companies and this is probably going to be true for 2017 too. Be aware that Oracle's database is outdated and they rarely make anything that stands out anymore. If the corporation decide to buy any software that you use regularly, expect a significant price hike. 

Deregulation
In 2016 the U.S elected president Trump, and with this it is predicted that...

» Read more
Enhanced Data Safety With New MarkLogic 9 Technology
Thumb cognitive systems header

Database landscapes have developed over the years giving birth to complex systems that can secure huge volumes of data. MarkLogi’s new release of the NoSQL database, which is set to be released before the end of 2016, will come with numerous features that should advance data safety and management. One of the main features that have been introduced includes the Key Management Interoperability Protocol (KMIP) encryption system. 

MarkLogic has placed its bet on the need for companies to transmit data from different enterprise silos, a process that calls for the application of...

» Read more
Quocirca Insights
Bigdata placeholder

Making the most of data: making data more open

( Source: www.computerweekly.com )
» Read more
Kaspersky Lab praised for handling of Duqu 2.0 cyber attack
Bigdata placeholder

Kaspersky Lab determined the best approach to cyber attack was to not only admit that it had been hacked, but also to provide extensive information on the malware

( Source: www.computerweekly.com )
» Read more
Airbus Defence and Space embarks on networking R&D venture with Cisco
Bigdata placeholder

Airbus Defence and Space has signed an agreement

( Source: www.computerweekly.com )
» Read more
SIEM, a combination of Big Data and IT-security
Thumb open uri20150408 4069260 3kv1hh

Big Data and IT-security combine forces in a new way, what is shown by new effective security solutions that are using Security and Event Managemt (SIEM).

Attacks on company-networks are getting more effective and much faster due to new technologies. Several studies have shown that attackers often only need a few hours from the beginning of an attack until they are able to access internal data. But companies using standard security tools need some months to handle all effects of an attack. And they just realize an attack after it is completed.

But with the combination of Big Data and...

» Read more
Loader