Only 20% of IBM mainframe customers are embracing multi-factor authentication to protect data and applications

While 64 per cent of mainframers are aware that multi-factor authentication (MFA) is now available to control access to mainframe applications, only 20 per cent acknowledge their organization is already using it or plans to do so, according to a new survey. Concerns about disrupting applications, lack of mainframe and security skills and resistance from end users are some of the issues holding back adoption. 

The findings come from a new poll of 81 mainframe users conducted by Macro 4, a division of UNICOM® Global, at the annual GSE UK Conference in November 2018.

Maintaining High SEO Rankings in the Competitive Digital Landscape

Boosting your online exposure and generating quality traffic is the foundation of your online success. To rank high in the highly competitive SERPs is challenging and requires a lot of effort, passion, and dedication. However, getting to the #1 spot on Google is only half the battle. The other half is, of course, maintaining your stellar rankings.

Here are a few steps you should take to stay competitive.

WatchGuard warns of Vaporworms, Global Internet Disruption and Rogue AI Chatbots for 2019

15 November 2018 – WatchGuard Technologies’ information security predictions for 2019 include the emergence of ’vaporworms’, a new breed of fileless malware with wormlike properties to self-propagate through vulnerable systems, along with a takedown of the internet itself and ransomware targeting utilities and industrial control systems. WatchGuard’s Threat Lab research team developed these predictions based on an analysis of major security and threat trends over the past year.

Millennials’ preference for authentic and transparent content shakes up global influencer marketing industry, new report finds

New York. (14 November, 2018): The ‘Influencer Marketing 2020’ report, published today by Influencer Intelligence in association with Econsultancy, found that for approximately 6 in 10 of the digital marketers surveyed, the purpose influencer marketing serves for their business has changed drastically in the last 12 months, with 56% claiming the younger generation of consumers is proving the biggest driver of change.

M-Files Leads Five of Gartner's 2018 Critical Capabilities for Content Services Platforms

DALLAS – Nov. 13th, 2018 – M-Files Corporation, the intelligent information management company, today announced that the company received the top scores in five key categories in the 2018 Gartner Critical Capabilities for Content Services Platforms report. The five key categories include content management, content security, search, metadata and classification and delivery model.

Does the modern telecommunications CTIO know how to deliver a 5G digital revolution?

DIGITAL TRANSFORMATION ASIA, Kuala Lumper, Malaysia – November 13, 2018 - Despite a growing number of communications service providers (CSPs) converging CIO and CTO functions and teams, there is no single technology strategy in place to help guide this process. This is a key takeaway from a new report from TM Forum, the industry association driving digital transformation through collaboration, launched at Digital Transformation Asia in Kuala Lumpur today. 

Quoting IT: Minecraft and New Power

"Of course, the battle and balance between old power and new power; the transformation of a world that worked like Tetris to one that functions more like Minecraft, has implications much bigger than gaming. 

The rise of new power is shifting people’s norms and beliefs about how the world should work and where they should fit in. Indeed, what is emerging — most visibly among people under thirty (now more than half the world’s population) — is a new expectation: an inalienable right to participate."

Top Ten Cybersecurity Predictions for 2019

Top Ten Cybersecurity Predictions for 2019

1. Increase in crime, espionage and sabotage by rogue nation-states

With the ongoing failure of significant national, international or UN level response and repercussion, nation-state sponsored espionage, cyber-crime and sabotage will continue to expand. Clearly, most organizations are simply not structured to defend against such attacks, which will succeed in penetrating defenses. Cybersecurity teams will need to rely on breach detection techniques.

Future Technologies and the Impact on Mobile Workforces and Their Devices

BRACKNELL, UK. 6th NOVEMBER 2018 - When asked to rate the importance of technology trends for use by their mobile workforce, buyers rated Big Data (52%) the most important, closely followed by IoT (51%) and Sensor technologies (41%), including atmosphere, temperature and biological sensors. The main drivers for the technologies were improved business efficiency and productivity.