All Opinions

Showing 1105–1116 of 4,239 opinions
Featured

Impact of AI | The impact of Artificial Intelligence on the workplace

Digitalisation and the new technological possibilities that artificial intelligence (AI) brings are driving the biggest social and economic changes since the industrial revolution. These are associate...

Kai Grunwitz, Author at Compare the Cloud 12 December 2018
IBM

Threat Intelligence Platform | IBM Resilient

[vc_row][vc_column][vc_column_text] [embed]https://vimeo.com/310622492/2c575e887e[/embed] Craig Roberts discusses how threat intelligence platforms and security orchestration automation platforms inte...

CTC Editorial Team 12 December 2018
Articles

Protecting Your Customers From Persistent Banking Fraud

[vc_row][vc_column][vc_column_text]With fraudsters rapidly growing in sophistication, the Financial Ombudsman has announced “it’s not fair” to automatically blame customers for falling victim to banki...

Zia Hayat 12 December 2018
Articles

Deploying containers securely and at scale with Multicloud Enabler powered by Red Hat and Juniper

[vc_row][vc_column][vc_column_text]Multicloud should be accessible for more than the worlds largest cloud providers. Here is how Juniper Networks and Red Hat can make that happen. The move to hybrid a...

Bikash Koley 11 December 2018
Front Page

The year Wearables 'ECG/Cardio-tech' becomes ‘Warnables’

ECG, EKG, Heart and cardio-tech all words which have been heard around the Apple Watch 4 which will read the wearer’s heart rhythms in a revolutionary way.

Alan Foreman 11 December 2018
IBM

Role Based Access Control (RBAC) | IBM Resilient

[vc_row][vc_column][vc_column_text] [embed]https://vimeo.com/315656601/91ac0f2c67[/embed] Role Based Access Control is critical in maintaining privacy and security over the investigation of incidents....

CTC Editorial Team 11 December 2018
Articles

Distinct Differences Between The AI and ML

[vc_row][vc_column][vc_separator][vc_column_text]Over the past few decades, the world has changed in a ton of different ways, but none bigger than when it comes to technology. Things most wouldn’t hav...

Wendy Dessler 11 December 2018
Articles

The Future of Data Centres

[vc_row][vc_column][vc_column_text]The world consumes an enormous amount of data every single day—about 2.5 quintillion bytes of data every 24 hours, and now even more so with the advancements in Arti...

Michael Isberto 10 December 2018
IBM

Crisis Management | IBM Resilient

[vc_row][vc_column][vc_column_text] [embed]https://vimeo.com/310608080/0afae566f8[/embed] Cybersecurity is now a board level issue and looking at previous cyber attacks it is clear to see that they af...

CTC Editorial Team 10 December 2018
Articles

The Dangers of Unsanctioned Shadow Apps

[vc_row ][vc_column ][vc_separator ][vc_column_text ] The threat posed by unsanctioned shadow apps is a growing concern for businesses everywhere. Shadow apps is the term used to describe any applicat...

Tim Bandos 10 December 2018
IBM

Dangers of automation part 1&2 | IBM Resilient

[vc_row][vc_column][vc_column_text] [embed]https://vimeo.com/310608280/1defb12bf5[/embed] [/vc_column_text][vc_column_text] [embed]https://vimeo.com/310608269/772a204f34[/embed] Automation is a big bu...

CTC Editorial Team 8 December 2018
IBM

SOAR markets | IBM Resilient

[vc_row][vc_column][vc_column_text] [embed]https://vimeo.com/310599818/f4191d368e[/embed] Security orchestration automation and response have previously been disparate, fragmented technology and proce...

CTC Editorial Team 7 December 2018