CFOtech Asia - Technology news for CFOs & financial decision-makers

Aria stories - Page 94

Aria is where cutting‑edge technology, security, and AI‑driven innovation intersect. The stories tagged here span everything from next‑gen cloud and data platforms to ransomware trends, smart infrastructure, and the fast‑evolving world of generative and agentic AI. If you want to understand how tools like AI copilots, LLMs, and real‑time analytics are reshaping everything from finance to healthcare to manufacturing, this is your starting point.

Dive into in‑depth coverage of cybersecurity – botnets, ransomware variants, mobile malware, zero‑day exploits, and the shift to continuous, intelligence‑led defence. Explore how data centres, networks, and observability platforms are being redesigned for AI workloads, sustainability, and hybrid cloud. Follow the rise of AI in everyday products too, from wearables and smart home devices to vehicles, retail experiences, and next‑gen collaboration tools.

Aria isn’t just about the technology itself, but about its impact: on regulation, trust, jobs, skills, and digital resilience. Here you’ll find expert commentary, major vendor announcements, case studies, and long‑form explainers that help you connect the dots between infrastructure, security, AI, and real business outcomes. If you’re responsible for strategy, architecture, risk, or innovation, the Aria tag will keep you ahead of what’s coming next.

Thinkstockphotos 612751440

APAC malware and botnet threats charge ahead rest of the world

Mon, 31st Oct 2016
#
malware
#
firewalls
#
ddos
Fortinet's latest report has revealed global cyber threat trends, showing that malware and botnets are targeting APAC more than anywhere else.
Thinkstockphotos 516764040

How the University of Melbourne's data backup puts consolidation front and centre

Tue, 18th Oct 2016
#
edutech
#
dr
#
data analytics
As a research institution that is ranked in the top 50 worldwide, the University of Melbourne takes data backup consolidation seriously.
Fallback

Exclusive: Ransomware isn't hard to beat - here's how

Mon, 17th Oct 2016
#
malware
#
ransomware
#
cybersecurity
Ransomware is a rapidly growing business - but it's also not hard to beat says SonicWall global evangelist Kent Shuart. He outlines how.
Thinkstockphotos 488640953

It's time to move on from “what is the Internet of Things” discussion if you want to secure it

Thu, 13th Oct 2016
#
iot
#
wireless networks
#
cybersecurity
Increasing confusion over the definition of IoT is distracting from the real importance: securing it, says Gartner.
Thinkstockphotos 599997332 ys0kqhq

How to be the cat - not the mouse - in the fight against zero-day malware

Tue, 11th Oct 2016
#
malware
#
ransomware
#
cybersecurity
Zero-day malware mutations can spell disaster for networks, as they can often get in completely undetected by traditional security protection.
Thinkstockphotos 605956402

Ransomware: Expert advice on how to keep safe and secure

Tue, 11th Oct 2016
#
malware
#
ransomware
#
cybersecurity
Paying criminals is never a good idea, even when it seems expedient. Ransomware authors are under no obligation to give you back what you pay.
Thinkstockphotos 474853530

Go Phish – how to spot a ransomware email

Fri, 7th Oct 2016
#
malware
#
firewalls
#
network infrastructure
With the crooks becoming smarter and more sophisticated every day, what does a modern day phishing email actually look like?.
Thinkstockphotos 465158558

Proofpoint uncovers new MarsJoke ransomware, then Kaspersky finds the fix

Wed, 5th Oct 2016
#
malware
#
ransomware
#
cybersecurity
British institutions are being targeted by a new ransomware strain called MarsJoke, with government and educational organizations being the main victims.
Thinkstockphotos 517128260 ehdih02

Symantec detects ransomware variants created directly on mobile devices

Tue, 4th Oct 2016
#
malware
#
ransomware
#
cybersecurity
New variants of Android.Lockscreen ransomware are using pseudorandom passcodes to prevent victims from unlocking devices, warns Symantec.
Thinkstockphotos 177403076

Google's data center security and design best practices

Tue, 4th Oct 2016
#
semiconductors
#
hyperscale
#
dc
Our data centers are monitored 24/7 by high-resolution interior and exterior cameras that can detect and track intruders.
Thinkstockphotos 538646904 1

Planning crucial to minimising and recovering from ransomware

Mon, 3rd Oct 2016
#
malware
#
ransomware
#
cybersecurity
Ransomware attacks are becoming increasingly common, with payments increasing each day you wait. Planning ahead is crucial.
Thinkstockphotos 175352158 1

Google to roll out enterprise-class testing and personalisation product

Mon, 3rd Oct 2016
#
data analytics
#
martech
#
planning
Google unveils free Optimize 360 for superior site testing and tailored user experiences, leveraging Analytics data.
Thinkstockphotos 544342588

Connected homes and IoT driving residential security systems

Mon, 3rd Oct 2016
#
iot
#
cybersecurity
#
technavio
The residential security systems market is set to grow more than 7% during 2016-2020, with security cameras leading the way.
Fallback

Hands-on Review: Microsoft Surface Book a 'pretty special piece of gear'

Tue, 27th Sep 2016
#
gaming
#
digital entertainment
#
microsoft
Microsoft's Surface Book dazzles with its clever design and premium build, proving to be a savvy investment for Windows loyalists.
Thinkstockphotos 530437166

Unit 42 discovers Komplex trojan targeting OS X systems

Tue, 27th Sep 2016
#
firewalls
#
network infrastructure
#
network security
The Sofacy Group is still coming up with new trojans, with Unit 42 researchers reporting that an OS X trojan called 'Komplex' is now on the scene.
Thinkstockphotos 598252950

Eaton showcases latest power solutions for data centers at DCD '16

Tue, 27th Sep 2016
#
datacentre infrastructure
#
hyperscale
#
dc
Eaton reveals grand plans for Singapore data center market, showcasing high performance UPS at recent conference.
Download

10 cybersecurity lessons learned from Season 2 of Mr. Robot

Mon, 26th Sep 2016
#
robots
#
cybersecurity
#
mr.robot
Cybersecurity and hacking are just plot devices the series uses to achieve its goals, but they play a major role in the series.
Thinkstockphotos 513120870

Carbon Black discovers new adware related threat

Mon, 26th Sep 2016
#
cybersecurity
#
carbon black
These obfuscation techniques easily evade sandboxing and other intrusion detection techniques due to Binary Fragmentation.
Thinkstockphotos 509230826

Employees download new malware every four seconds, says Check Point

Wed, 21st Sep 2016
#
cybersecurity
#
check point software
#
threat landscape
Check Point report: Employees unwittingly download new malware every four seconds, posing a stark threat to global cyber security.
Global security3

Sophos releases product to address global cybersecurity skills shortage

Tue, 20th Sep 2016
#
malware
#
firewalls
#
network infrastructure
Intercept X looks to provide a fast-track to advanced protection and response capabilities while minimising the need for specialised security admin.