TechTarget News - Week of Dec 10, 2017

Australian genome researchers solving big data problems

Researchers at the Commonwealth Scientific and Research Organisation have developed a cloud-based tool to look for the needle in a haystack in what they have described as the "datafication of everything"

Bumps in the road ahead for Nordic cashless societies

Sweden and Norway are global leaders when it comes to reducing the use of cash in the economy – but what about the Nordic region as a whole?

Perth airport security plans stolen by Vietnamese hacker

Australian authorities have named a Vietnamese hacker they say was able to break into the IT systems at Perth International Airport and steal security information

Hitz: NetApp market growth hinges on cloud, data management

Storage stalwart NetApp celebrated its 25th anniversary in 2017. NetApp founder Dave Hitz reflects on its evolution and the impact of Cloud OnTap, Data Fabric and SolidFire HCI.

Innovation key to halt cyber attacks

In the light of the number of cyber breaches taking place, innovative security systems are required, according to the UK National Cyber Security Centre (NCSC)

Researchers find trove of 1.4 billion credentials

Security researchers have discovered what is believed to be the largest aggregate database found in the dark web to date, prompting fresh calls for improved identity management

1.4 billion stolen credentials found on dark web

A massive repository containing more than 1.4 billion stolen credentials was found on the dark web with special features for malicious actors.

Bitfinex restored after DDoS attack

Bitcoin exchange Bitfinex says its systems have been restored after the company was hit by a second denial of service attack in just over a week

Dutch IT expert takes an ethical hacking sabbatical

Ethical hacker discovered nearly 1,000 vulnerabilities after taking a year off from his job in the Netherlands government to set up a hack group

Cyber security skills shortage can be addressed, says (ISC)2

The shortage of cyber security skills can be addressed, starting with training anyone who is unemployed, according to information security professional training and certification body (ISC)2

SD-WAN a tool for combining networks, engineer says

When your company acquires another, combining networks can be a chore. But SD-WAN could ease the pains associated with integrating disparate topologies.

Quantum Xcellis scale-out NAS tackles unstructured data

Quantum's new system takes on scale-out NAS and object markets. The vendor says its Xcellis NAS tier will scale from 40 TB to petabytes without a performance hit.

HP is running its global print supplies production from Singapore

The personal computing and printer giant has opened a facility in Singapore to oversee over 50 print supplies manufacturing lines and test the use of robots, data analytics and 3D printing to improve production efficiency

Misconfigured Amazon S3 buckets expose sensitive data

Amazon has built more security functions for S3 buckets after cybersecurity firms uncovered a worrisome trend of IT administrators failing to properly secure them.

Free phone service could boost Dialpad's UCaaS status

UCaaS provider Dialpad is offering a free cloud telephony service that integrates with G Suite, while a new partner program offers Workplace by Facebook support.

Top cyber security predictions in APAC in 2018

Cyber criminals will ramp up efforts to mine cryptocurrencies, while mobile malware will rear its ugly head across the APAC region in 2018

Oracle Q2 2017-18 results see cloud revenue grow to $1.5bn

Oracle’s second-quarter 2017-18 results show an increase in cloud revenue of 44%, and overall growth of 4% to $9.6bn. Executives are bullish against competition, buoyed by artificial intelligence makeover of database

NHS builds online ID verification platform

NHS England’s chief digital officer Juliet Bauer reveals the NHS is working to build its own online ID verification system

Triton framework used in industrial control attacks

Security researchers discovered new ICS attacks using the Triton framework that may have been nation-state-sponsored and intended to cause real-world damage.

Contact Us Contact Sales
Conversion Pixel