Cognitive Automation Explained

Cognitive automation is the use of AI techniques, such as machine learning, cognitive computing, speech recognition and natural language processing to automate business processes that are normally...

Computational Storage Explained

Computational storage is an approach in data computing for IT infrastructure where data is processed at the storage device itself, enabling real-time storage and analysis of data. By adding...

Containers Explained

In IT, containers refer to lightweight, portable units that encapsulate an application and its dependencies, ensuring consistent and isolated execution across different environments. They enable...

Content Delivery Network (CDN) Explained

A Content Delivery Network or CDN refers to the geographically distributed series of servers that act in the middle of a central/origin server and end-users, virtually reducing the distance that...

Continuous Data Protection

Continuous Data Protection or CDP is a process for protecting data that provides more granularity than traditional backup. CDP monitors primary data and tracks every change to that data in real...

Credential Stuffing Explained

Credential stuffing is a cyber attack technique whereby an attacker uses compromised credentials or login information on different services in order to gain unauthorized access into a user’s...

Crypto Dusting Attack Explained

Crypto Dusting Attack Explained A dusting attack is a situation where trace amounts of a cryptocurrency are sent to many thousands of crypto wallets.  The amounts are intentionally tiny...

Cryptojacking Explained

With the dawn of cryptocurrency, a new form of hijacking has emerged. A way to steal power and resources from a computer to be used for bitcoin mining. Cryptojacking, can be done on any device that...


Cyber Resilience Explained

Cyber resilience goes beyond the ability of a single computing system to bounce back from threats. In a business context, it signifies an organisation's comprehensive strategy to prevent,...

© Asia Online Publishing Group Sdn Bhd 2024
Powered by