Category Archives: IT Security, Risk & ESG

So long, and thanks for all the phish

How to avoid that hook at the end of a fraudster’s line

Don’t Let an Outdated Software Strategy Hold You Back

Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]

Enterprise file sync and share comes of age

The enterprise file sync and share market has truly come of age, with products and[...]

Managing Web and Mobile Security Risk

Securing the applications and services that underpin your online and mobile presence is one thing,[...]

Rethinking long term data management

The emerging role of active archiving

Managing Cloud Complexity

The emerging role of converged services

IT Decision-Making in the Digital Age

Making the right technology investments in today’s fast moving digital age can mean the difference[...]

Protecting data in your hyper-converged environment

In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]

A peek behind the AI bandwagon

When an important topic or trend gives rise to a marketing and media bandwagon, any[...]

Data encryption must be a priority for the digital business

Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]

Intelligent Systems in Action

As technology becomes smarter, more opportunities arise to exploit AI, machine learning and other forms[...]

Cyber Security Ownership and Responsibility

It’s easy to be caught out by a cyber attack or internal mistake that leads[...]

APIs and the Digital Enterprise

Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]

Building a Curated Digital Hub

In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]

Tackling End User Content Sprawl

In a nutshell The problem of content sprawl has been around since the early days[...]

Readers of The Register speak out on Thin Client technology

Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]

Network Security Solutions

IT Security is complex and trying to work out whether it is better to use[...]

Data Protection and Management in a Box

In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]

Taking Cyber Security to the Next Level

As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]

Mobile Security and the Challenge of User Resistance

Mobile security is becoming more of a headache as the crossover between business and personal[...]

Future Proofing Your Network

Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]