Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How to encrypt email

If you need to send a password, bank details or other sensitive information, you should really use an encrypted service. Here's how to send encrypted emails to anyone on any email service, including Gmail

Why CyberSecurity Malaysia was in Azerbaijan

CyberSecurity Malaysia CEO Dato’ Dr Amirudin Abdul Wahab told Computerworld Malaysia that some 200 participants from 34 countries gathered in Baku, Azerbaijan to discuss their cyber security agendas.

TECHNOLOGY

APPLICATIONS

With new apps and services, IT connects deskless workers to biz

Messaging apps and mobile services from companies like Zinc and Crew are springing up to help connect workers not bound to a desk with colleagues in the office.

CLOUD COMPUTING

Dimension Data creates cloud powerhouse with NTT

Providers will combine IaaS expertise under the management of NTT Communications

COMPUTER HARDWARE

Singapore, NVIDIA to provide AI training through shared facility

The National Supercomputing Centre and NVIDIA will establish a shared facility to provide training to 400 researchers and developers of AI Singapore (AISG).

DATA CENTRE

Technology Experts to Discuss the Future of Data Centre Security

We gather the views of CIO Asia's extended network of IT security experts and contributors to predict the future of data centre security

EMERGING TECHNOLOGY

McKinsey in Malaysia: What are the keys to capturing real opportunities from artificial intelligence?

Computerworld Malaysia Industry 4.0 interview with McKinsey’s Shilpa Aggarwal on how advanced analytics and artificial intelligence can enhance decision making.

INDUSTRIES

Trustsphere's relationship analytics stack selected as a finalist of LumenLab’s collab 2.0

The solution uses network analytics to help reduce the risk of data leakage for today’s digitally-enabled insurance companies.

INTERNET

Are You Losing Customers to Poor Security?

MOBILE

iPhone 2018 rumors: Improved data transmission and an iPhone X Plus?

The iPhone X just hit stores, but there's already speculation about 2018's iPhone. We've collected all the rumors right here.

NETWORKING

The Untapped Value of Increasing Your Network Visibility

By analysing network traffic patterns and volume, enterprises can engage customers better, from improving application to adjusting bandwidth availability during peak engagement periods.

OPERATING SYSTEMS

Google’s new mechanism to embed web content in Android apps

The Trusted Web Activity capability, soon to be in beta, lets apps use web-based content in a chromeless window

SECURITY

Malaysia’s Inland Revenue warns of new wave of phishing scams

Here are 5 keys to spotting phishing scams from network and security strategist Gavin Chow.

STORAGE

Ensuring a smooth transition to digital transformation

Here are five tips to help you drive the greatest success in your digital transformation project.

RELATED WHITE PAPERS

BLOGS

Detecting and guarding against phishing attempts

Here are some ways to better detect and prevent oneself from being a victim of phishing attacks.

CTO Reflections: Beyond the Appliance

Modern cybersecurity technologies are a must but organisations deploying them need to look beyond the boxes that sit on their racks.

RELATED WHITE PAPERS