
New SD-WAN edge enables more secure architectures
Predictions for the wide area network (WAN) in 2018.
Read more...Predictions for the wide area network (WAN) in 2018.
Read more...Keith Martin, F-Secure’s new Asia-Pacific and Japan Head of Corporate Business, and Amit Nath speak to Computerworld Malaysia about the current threat landscape.
Read more...What does 2018 have in store for cyber security, and could it possibly be worse than this year?
Read more...20 regional teams pit their best security practitioners against one another in the inaugural Ixia Cyber Combat 2017
Read more...CyberSecurity Malaysia CEO Dato’ Dr Amirudin Abdul Wahab told Computerworld Malaysia that ‘VAPT also extends to assessing SCADA/ Industrial Control System security.’
Read more...The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
Read more...The conception of AI is actually ancient. Thousands of years ago, the Greeks discussed the possibility of placing a mind inside a mechanical body.
Read more...Last week I had the opportunity to listen to a very interesting return of experience on the use of shared Flash technology for Big Data, and more specifically Hadoop workloads.
Read more...In 2014, IBM mainframes celebrated their 50th anniversary, and today these iconic High-End Systems are stronger than ever.
Read more...The recent launch of the IBM z14 enterprise system reminds us that the mainframe platform did not die in the early ‘90s, as predicted by a number of very clever people.
Read more...The best private cloud in the world - hands down!
Read more...To ensure a solution that both satisfies your immediate requirements and is adaptable to how you may wish to forecast and budget in the future, we’ve identified the Top 5 questions you should be asking your potential vendors.
DownloadA new survey reveals that many companies do not have secure BYOD policies in place. By ignoring security steps and employee BYOD education, you could be jeopardizing your confidential data. Get the facts, and tips from the survival guide!
DownloadBusinesses are acquiring flash memory systems to boost critical application performance, and strategically deploy resources for data management. IBM Global Financing can help implement a strategic plan to fund and manage your IBM FlashSystem investment.
DownloadThe primary goal of an OLTP system is very fast query processing while maintaining data integrity. This Solution Guide describes how IBM flash storage systems drive extreme performance, cost efficiencies, and enterprise reliability to satisfy the demanding requirements of an OLTP implementation.
DownloadSmart city living gets a jab in the arm with the new SURF@NCS facility and an exciting new partnership looks promising for smart city solutions. Learn to identify the latest cybersecurity threats, and what to do when cybersecurity gets too hard.
DownloadWhy the top 4 IT priorities in 2018 are faster, smarter, in memory, in cloud
The success factors behind purpose-led enterprises
Customer satisfaction key to digital transformation success
Alibaba Cloud confirms commitment to Malaysia’s nation-building efforts
Security trends 2018: biometric hacking, state-sponsored attacks, daring cyber heists
The success factors behind purpose-led enterprises
Customer satisfaction key to digital transformation success
Alibaba Cloud confirms commitment to Malaysia’s nation-building efforts
The success factors behind purpose-led enterprises
Customer satisfaction key to digital transformation success
Alibaba Cloud confirms commitment to Malaysia’s nation-building efforts
Why the sharing economy in Malaysia is taking off
F-Secure predicts higher AI, IoT and state-sponsored cybersecurity incidents