Digital Currency Explained

Digital currency, as the name suggests, is a form of currency that is only available digitally. Unlike traditional currency, it doesn’t exist in physical form (such as banknotes or coins) and...

Domain Spoofing Explained

What is Domain Spoofing? Domain spoofing is a form of online fraud or phishing technique whereby cybercriminals impersonate a company or its employees using a fake domain that appears similar...

DRaaS Explained

Disaster Recovery as a Service (DRaaS), refers to a service rendered through cloud computing and backup that operates from the cloud as a means to protect the customer’s data in a disruptive...

Email Borne Threat Explained

For most enterprises, email continues to be a primary channel of communication. According to a  study by the Radicati Group , the total volume of worldwide emails sent and received per day is...

Enterprise Cloud

We all think we know what cloud computing is, but when you ask different people to provide a definition it’s interesting to see the different responses that come back. Cloud Computing is...

Extreme Data Economy Explained

The era of Extreme Data Economy is where businesses are challenged to deal with operating at extreme scales, at extreme speeds involving extreme complexities and extreme amounts of data. When...

Flash Business Benefits Explained

When people think of enterprise flash storage they talk about technical features like performance but actually that is not as important as the business outcomes that flash delivers. The reason why...

GDPR Compliance

GDPR Compliance explained   General Data Protection Regulation is a European Union (EU) initiative which comes into effect in May 2018. It is being put in place to strengthen...

GDPR Consent Explained

Under the General Data Protection Regulation ( GDPR ), consent is one of the six legal bases for the lawful processing of personal data. Article 4 of the GDPR defines consent of the data subject...


© Asia Online Publishing Group Sdn Bhd 2017
Powered by