Category Archives: IT Security, Risk & ESG
Safe and Effective Remote Working
Addressing immediate pandemic-related needs while laying foundations for the future[...]
Network security in the spotlight
Understanding why it can go wrong is key to making the right investment decisions[...]
Lifecycle Management of HCI Systems
Every element of the solution needs attention[...]
Why backup to flash
Analyst Blog: There are some things that simply have to happen, no matter how modern[...]
Digital workspace disasters and how to beat them
New roles for user management and app deployment in the digital workspace[...]
Managing Software Exposure
Time to fully embed security into your application lifecycle[...]
Dealing with the GDPR Challenge Infographic
The catalyst for a move to modern data protection[...]
Data Protection Revisited – Business
A risk review and investment guide for business executives[...]
Data Protection Revisited – IT
A risk review and investment guide for IT professionals[...]
All-in-one Data Protection
Taking the pain out of information management[...]
GDPR: the Security Dimension
Information security, governance and regulation in harmony[...]
What’s all the fuss about in-memory databases for IoT?
Meeting the need for speed[...]
Data Management for a Digital World
Turn GDPR compliance and ransomware defence to your advantage[...]
Causes of software development woes
Respondents point the finger at ambiguous requirements[...]
Integrating Security Into the DNA of Your Software Lifecycle
“Masters” move beyond pure risk management to focus on business growth[...]
Requirements-driven software development and quality management
Removing the ambiguity from your delivery pipeline[...]
Information management is going mainstream – at last!
Analyst opinion Some assumptions have been held by IT pros for so long that they[...]
GDPR’s latest gift? Class action privacy cases
Analyst opinion Europeans will in future be able to bring US-style class actions for (alleged)[...]
Getting a grip on the GDPR
Here's our tips on how to plan rather than panic[...]
So long, and thanks for all the phish
How to avoid that hook at the end of a fraudster’s line[...]
Don’t Let an Outdated Software Strategy Hold You Back
Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]