Sixty-second Insight

Ken Chew of Ericsson on why small and medium-sized enterprises should not fear embracing the mobile cloud.

Satori

Unlike early IoT malware that leveraged default or weak passwords, new malware families are starting to exploit either known vulnerability or even zero-day vulnerabilities.

Chatbots

Contrary to common sense, human beings are quite willing to form relationships with AI software, and as chatbots apply AI to understand us, they could learn to sway our attitudes and orchestrate our reactions.

Ed Ansett at DCD Zettastructure

Ed Ansett of i3 Solutions floats the feasibility of a data centre that operates at 35 deg C, is cooled by LNG waste, runs on solid oxide fuel and does not need any generator on standby.

Cybersecurity groundhog day

Lessons from the past could help us avoid cybersecurity groundhog day, says Diana Kelley of IBM.

Lennie Tan of One Identity

Lennie Tan of One Identity discusses how organisations can address security issues across the entire hybrid cloud platform.

Cybercriminals target Apple

Apple devices are becoming attractive targets for cyber attackers due to their fast growing popularity and user demographics, says Fortinet.

3D printing is one of the technologies used at DCC.

The learning factory, which uses an IoT technology platform from PTC, will help attendees learn how to use the latest digital technologies and increase productivity

Halvar Flake at BlackHat Asia 2017

Cyber insurance has the potential to upend an enterprise buyer-IT vendor relationship which is currently heavily weighted in favour of the latter, says Google’s Halvar Flake.

Pages

Subscribe to RSS - Infrastructure