Category Archives: IT Security, Risk & ESG

Safe and Effective Remote Working

Addressing immediate pandemic-related needs while laying foundations for the future[...]

Network security in the spotlight

Understanding why it can go wrong is key to making the right investment decisions[...]

Lifecycle Management of HCI Systems

Every element of the solution needs attention[...]

Why backup to flash

Analyst Blog: There are some things that simply have to happen, no matter how modern[...]

Digital workspace disasters and how to beat them

New roles for user management and app deployment in the digital workspace[...]

Managing Software Exposure

Time to fully embed security into your application lifecycle[...]

Dealing with the GDPR Challenge Infographic

The catalyst for a move to modern data protection[...]

Data Protection Revisited – Business

A risk review and investment guide for business executives[...]

Data Protection Revisited – IT

A risk review and investment guide for IT professionals[...]

All-in-one Data Protection

Taking the pain out of information management[...]

GDPR: the Security Dimension

Information security, governance and regulation in harmony[...]

Data Management for a Digital World

Turn GDPR compliance and ransomware defence to your advantage[...]

Causes of software development woes

Respondents point the finger at ambiguous requirements[...]

Integrating Security Into the DNA of Your Software Lifecycle

“Masters” move beyond pure risk management to focus on business growth[...]

Requirements-driven software development and quality management

Removing the ambiguity from your delivery pipeline[...]

Information management is going mainstream – at last!

Analyst opinion Some assumptions have been held by IT pros for so long that they[...]

GDPR’s latest gift? Class action privacy cases

Analyst opinion Europeans will in future be able to bring US-style class actions for (alleged)[...]

Getting a grip on the GDPR

Here's our tips on how to plan rather than panic[...]

So long, and thanks for all the phish

How to avoid that hook at the end of a fraudster’s line[...]

Don’t Let an Outdated Software Strategy Hold You Back

Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]