Chuan Wei Hoo of BT Advise Assure

Poor visibility and limited availability of cyber intelligence remains a major stumbling block in responding to security incidents.

CK Lam of Brocade

While SDN continues to hog the media headlines, it is network functions virtualisation that is delivering the goods.

DDoS simulation

The robustness-testing technique seeks to uncover unknown zero-day vulnerabilities by triggering them with unexpected inputs and monitoring for system failure.

CommunicAsia 2014

Singapore’s Smart Nation vision and the buzz around this technology in this year’s CommunicAsia show has added more weight to the Big Data hype.

David Blumanis of Schneider Electric

The way data centres are designed, built and managed will have to change to address issues such as time to market and energy consumption as they compete for IoT and cloud opportunities.

Information security

Research firm highlights the key technologies for information security in 2014 and their implications for organisations.

Cisco Visual Networking Index

Cisco study identifies India and Indonesia as countries with the fastest growth rate, with 39% and 37% CAGR respectively.

China's Smart City

The opportunity gaps for participation exist across all spectrums of Smart City policies, funding, and implementation focuses in China, says report.

Security

To address IoT security challenges, CISOs should start by developing initial security projects based on specific IoT interactions within specific business use cases, says Gartner.

Tan Ee Sze

If you were to deploy a converged infrastructure, would you embrace its benefits wholeheartedly or would you be gripped by worries over vendor lock-in?

Pages

Subscribe to RSS - Insights