adv

Blogs

Picture of blogger

Hong Kong mobilized by tech weapons of mass disorder

 Recent scenes across Hong Kong have shocked and awed local and international audiences. While...
Stefan Hammond

Are password managers secure?

None of us can remember all our passwords. Yes, we know to use strong passwords, and we never use...

Opinions

Digital storytelling is rising in APAC. Are you ready?

Digital storytelling is rising in APAC. Are you ready?

They say a picture is worth a thousand words. But, now there is research to support it.A doctoral...
Should Chief Marketing Officers be involved in security and privacy decisions?

Should Chief Marketing Officers be involved in security and privacy decisions?

In a report by PricewaterhouseCoopers, the management consulting firm urged chief marketing...

Sponsored Content

The interconnect solution provider widens ERP capabilities, lowers IT investment cost, and improves overall reliability.Uncompromised quality has reaped success for SOLERS. It is one of the key...
Alcatel-Lucent Enterprise wants to help customers shift to next-generation enterprise communications solutions as it begins a new chapter as an independent company.Alcatel-Lucent Enterprise (ALUE)...
Running a hotel is a balancing act. You need to find the sweet spot when offering an experience that is uniquely different, while ensuring that the experience meets the needs of a diverse clientele....

Featured Story

Top five smartphone disappointments of the year
The poor design of two different smartphones, a low-resolution front camera with the new iPhone, the Moto G's lack of LTE, and the hefty price tag of...
3 low-tech threats that lead to high-profile breaches
3 low-tech threats that lead to high-profile breaches
In an age where data security defenses are getting more and more sophisticated, there will be...
Death of antivirus software greatly exaggerated
Death of antivirus software greatly exaggerated
An executive at a company whose name is synonymous with antivirus software raised eyebrows earlier...
Complex threat patterns require a shift of CIO mindset
Complex threat patterns require a shift of CIO mindset
The increasing complexity of today’s cyber security threats demands a rethink of CIOs’ approach to...

Events