We would like to keep you up to date with the latest news from Digitalisation World by sending you push notifications.
Subscribe to Digitalisation World
Digital Newsletter Each week our editor Phil Alsop rounds up the most popular articles, videos and expert opinions. We compile this into a Digital Newsletter and send it straight to your inbox every week.
Digital Magazines We'll let you know each time a new edition of Digitalisation World is released so that you're always kept up-to-date with the latest and greatest news and press releases.
Video Magazines The Digitalisation World Video magazine contains the latest Zoom interviews with experts in the industry.
62% of security professionals in Asia Pacific say that defending against user behavior is their #1 challenge. Find out what else can businesses do to reduce the risk that email threats pose with Stephen Dane, Managing Director, Cybersecurity, APJC, Cisco.
Seattle Proton Therapy turned to Dell EMC Data Protection to solve an immediate capacity need for backing up their patients’ medical records while complying with government regulations like HIPAA. They found the Dell EMC IDPA DP4400 appliance easy to deploy, with a minimal learning curve for their admins. With excellent deduplication, they continue to save space, and they’ve reduced the time to access crucial data from 1 to 2 weeks to a matter of minutes.
At the "Cybersecurity Insights: Security in the Digital Era" event, John Pescatore, Director at SANS Institute, discusses how infrastructure and security have always been linked, but not particularly successful. Why has it failed and what must happen now?
Email is the number one threat vector for delivery of malware into organizations. Stephen Dane, Managing Director, Cybersecurity, APJC, Cisco, explores the current state of the challenges that security practitioners face, and what CISOs can do to reduce the risk that email threats pose.
It should be: With today's attack landscape, continuous threat detection and monitoring is a must-have, not an option. See how Stealthwatch can help by analyzing your entire network traffic, on-premises or in the cloud. It reduces massive data sets to high-fidelity alarms using behavioral modeling, machine learning and Talos threat intelligence.
By 2021, it’s estimated that cybercrime will cost the world economy more than $6 trillion. In our hyper-connected world, every device is storing and computing data making it a potential touch point for intrusion by a cybercriminal, ransomware, or malware. Understanding the shifting threat landscape is crucial to safeguarding data. This is why Hewlett Packard Enterprise is building security into everything we do. Explore how security innovations from Hewlett Packard Labs make into product roadmaps and find out what top IT security trends and challenges to look out for in the near to longer term.
Keeping pace with digital innovation means having to manage new digital risks. Watch as Ben Desjardins, RSA, and Branden Williams, Director, Cybersecurity, MUFG, discuss the digital evolution of the financial industry and how institutions are addressing new risk challenges.
In this talk, delivered at the main stage of the Security Analyst Summit 2019 in Singapore, Costin Raiu and Vitaly Kamlyuk reflect on the discovery of #ShadowHammer - a #supply-chain attack that affected thousands of #ASUS computers.
Dell Technologies announces new solutions to help communications service providers (CSPs) facilitate network cloud and operations transformation to achieve improved economics and agility, while maintaining...
The Detroit Pistons of the National Basketball Association (NBA) had a game plan to improve its data infrastructure in support of the team’s front office, administrative and basketball operations at the...