Asian e-Marketing

osx

Apple operating system increasingly the target of malware

MacOS has the reputation of being a relatively attack-proof operating system. Not only among Apple users, MacOS has always been far less susceptible to malware and cyberattacks than the market leader Windows. The fact is, however, that even Mac users are not immune to compromises or dangerous infections, as there is more and more malware […]

Apple operating system increasingly the target of malware Read More »

Virtual Event Devices com 009b6ab1539029aef4da197645c10349

ConnecTechAsia announces headliners and themes for virtual conference

Featuring over 220 speakers and more than 200 sessions, the ConnecTechAsia conference will cover all the latest trends within the Telecom, Media and Technology (TMT) space: Anne Chow, CEO, AT&T Business; Huey Tyng Ooi, Managing Director, Head of GrabPay, Grab; Brenda Harvey, General Manager, IBM Asia Pacific; Vikram Sinha, COO, Indosat Ooredoo; ST Liew, VP

ConnecTechAsia announces headliners and themes for virtual conference Read More »

enterprise head macbook2x

ioGates ultra secure content sharing service adds desktop app and smart link sharing

ioGates, a developer of ultra-secure file-sharing services for media professionals, has expanded its content sharing service to include new “Smart Link” automation and metadata management capabilities. Enhancements let users define multiple sharing rules in a single ioGates “Smart Link.” New metadata extraction capabilities index freshly shot content, making it easy for digital imaging technicians, production

ioGates ultra secure content sharing service adds desktop app and smart link sharing Read More »

priviledged

Privileged accounts remain a popular gateway for hackers

Privileged accounts, such as local admin and service accounts, exist everywhere in multiple places throughout an organization, and trying to manually discover and manage them is virtually impossible. That’s why Thycotic recommends automating privileged account discovery on a continuous basis so that you can see what you need to protect and what security controls should

Privileged accounts remain a popular gateway for hackers Read More »

thycotic

Thycotic deploys advanced machine learning to control dangerous applications on endpoints

Thycotic, a provider of cloud-ready Privileged Access Management (PAM) solutions for more than 10,000 organizations worldwide released Privilege Manager 10.8 which uses advanced machine learning capabilities to better assist IT teams in securing employee workstations and servers. The company makes enterprise-grade privilege management accessible for everyone by eliminating dependency on overly complex security tools and

Thycotic deploys advanced machine learning to control dangerous applications on endpoints Read More »

it

It’s not about technology, but people

Looking at today’s working life, we can say we have become more productive and faster. But did we become happier or at least more satisfied? Certainly, not! Digital transformation, disruptive technologies, change, and agility are current buzzwords in our business world, that point out that with rapidly developing technology requires changes in human “resource”, too.

It’s not about technology, but people Read More »

how

How and especially why do human beings select or decide against a product or service?

According to neuroscientists up to 70%-95% of all people make decisions unconsciously and give themselves then a “logical explanation” for their choice within fractions of a second. That’s why very often we get wrong explanations when we ask about it.

How and especially why do human beings select or decide against a product or service? Read More »

qlik

New Data-to-Insights (D2I) assessment tool evaluates performance improvements

Qlik launched two new resources that build on the recent global IDC study sponsored by Qlik, which shows organizations that invest in creating data-to-insights (D2I) capabilities through modern data and analytics pipelines are seeing significant gains. Through the new IDC hosted assessment tool, every organization can evaluate the strengths and gaps in their own data

New Data-to-Insights (D2I) assessment tool evaluates performance improvements Read More »