Ransomware would come back. Here’s what you need to know
12 May 2017 - A global wide-spread ransomware known as "WannaCry" aka. WanaCrypt0r infected more than 200,000 computers in 150 countries...
12 May 2017 - A global wide-spread ransomware known as "WannaCry" aka. WanaCrypt0r infected more than 200,000 computers in 150 countries...
Securing your login information do more than securing your online accounts, it ensures that your personal information is inaccessible to any other third party. How can you then, aid in securing your login information?
According to an estimate issued by International Chamber of Commerce (ICC). Besides, brands suffer from negative impacts such as brand image damage and loss of customer confidence due to......
2014 Data Breach Investigation Report from Verizon reported that the number one way hackers are gaining access to information on computer networks continues to be the......
The use of web applications in the enterprise has grown exponentially in the last decade. This will likely continue into the next decade, driven by trends such as the Internet of Things (IoT).
The consumerization of IT and bring your own device (BYOD) initiatives in the workplace are challenging IT leaders to deliver secure mobility without spoiling users’ mobile experience.......
The survey of 725 senior financial services leaders in Australia, Hong Kong, Japan, the UAE, the UK and Singapore also showed that IT security is now more likely to get......
According to Gartner, federated single sign-on (SSO) will be the predominant SSO technology needed by 80% of enterprises through 2016. Analysts at the company highlight......
i-Sprint participated in the NetworkWorld Asia Info Security Conference 2014 4th annual conference as one of the sponsors for this event. It was held on 12 August 2014 at Prince Hotel, Kuala Lumpur, Malaysia....
NetworkWorld Asia and i-Sprint hosted a breakfast round table in Malaysia to find out from IT heads their views on how to best improve convenience for....