Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

WPA2 hack: How secure is your Wi-Fi?

'Krack' (Key Reinstallation AttaCK), leaves wireless traffic vulnerable to potential eavesdropping with malicious intent, but there are ways to protect yourself

TECHNOLOGY

APPLICATIONS

How Samsung uses social media analytics to understand customers and guide strategy

The company uses Crimson Hexagon to analyse customer sentiment on social media

CLOUD COMPUTING

How integration supports the supply chain evolution

CIOs in the supply chain sector are investing in transformation projects to improve how they source, produce and move goods faster at a lower cost.

COMPUTER HARDWARE

A*STAR designs new data structure to improve network security

REX speeds up analysis of data flow to block cyber threats.

DATA CENTRE

Ensuring a smooth transition to digital transformation

Here are five tips to help you drive the greatest success in your digital transformation project.

EMERGING TECHNOLOGY

How integration supports the supply chain evolution

CIOs in the supply chain sector are investing in transformation projects to improve how they source, produce and move goods faster at a lower cost.

INDUSTRIES

Fujitsu opens satellite office in Cebu

Fujitsu’s Global Delivery Centre in Cebu Business Park will open 400 job opportunities for Filipinos living in the city.

INTERNET

Govt launches review of Aussie domain management

Releases terms of reference for a review of the .au Domain Administration.

MOBILE

How Samsung uses social media analytics to understand customers and guide strategy

The company uses Crimson Hexagon to analyse customer sentiment on social media

NETWORKING

KRACK Wi-Fi flaw: What you should know

The flaw can take advantage of vulnerabilities in the WPA2 security protocol

OPERATING SYSTEMS

For enterprises, the big changes to Windows 10 1709 aren't obvious

With Fall Creators Update, the devil is in the details, including noteworthy name changes, deployment timing, quick availability and the number of versions stored on a single .iso image.

SECURITY

How to crack KRACK: Action plan from Malaysian security experts

Here are some guidelines from CyberSecurity Malaysia and digital security experts for IT admins and internet users on how to stay safe from the latest exploit - KRACK.

STORAGE

Ensuring a smooth transition to digital transformation

Here are five tips to help you drive the greatest success in your digital transformation project.

RELATED WHITE PAPERS

BLOGS

Ensuring a smooth transition to digital transformation

Here are five tips to help you drive the greatest success in your digital transformation project.

Compliance and your data centre: Three things to know

Here are three key things you should remember when it comes to regulatory compliance.

RELATED WHITE PAPERS