Articles
Anatomy of a supply chain software attack
Threat actors are increasingly targeting the software supply chain because of the leverage available from a successful breach. [ + ]
Why comprehensive and secure SD-WAN solutions are essential
Organisations are increasingly looking to software-defined WAN (SD-WAN) solutions to help better protect their environments. [ + ]
Using technology to harness solar power for schools
The Solar for Schools program is funding the installation of solar panels in schools to make environmental responsibility a key part of education. [ + ]
Small is beautiful in digital transformation
Digital transformation is a journey usually characterised by large initiatives, but the underlying smaller actions can deliver value more quickly. [ + ]
Enhancing digital transformation with data mesh
Taking a new approach to information management and employing a data mesh can make an immense difference to the success of digital transformation endeavours. [ + ]
Increase in ransomware attacks on education institutions
According to a new survey, 60% of education institutions suffered ransomware attacks in 2021. [ + ]
Grant supports free creative coding for kids
The LEGO Foundation has provided a $5 million COVID Relief Support Grant to creative coding platform Scratch. [ + ]
Algorithm 'amnesia': solving how the brain learns
Potential insight into how the brain learns has been provided by a discovery about how algorithms retain information. [ + ]
Identifying blind spots: OT infrastructure vulnerability
As OT intersects with external networks, the threat surface expands exponentially, creating infinitely more vulnerabilities and attack paths to be exploited. [ + ]
Modern master data management: top 3 considerations
As more organisations turn to master data management to deliver value from transformation efforts, a traditional MDM system may fall short of expectations. [ + ]
Metaverse resilience through cybersecurity and governance
The metaverse provides new opportunities across many industries, but a lack of understanding is leaving early adopters exposed from a security perspective. [ + ]
Identity standards needed in the age of digital twins
The path to operating devices, processes and systems concurrently with digital twins is likely to be rough until approaches to digital identity become clearer. [ + ]
Are cloud providers too big to fail?
As more critical processes move to the cloud, reliance upon a very small number of dominant cloud service providers creates risk to operational resilience. [ + ]
The benefits of low-code and no-code CRM
The availability of low-code and no-code development tools has reduced the need to build, customise, maintain and update systems, reducing cost and complexity. [ + ]
Online community of children spreading malware
An online community of minors who construct, exchange and spread malware has been discovered by digital security firm Avast. [ + ]