Category Archives: IT Security, Risk & ESG
So long, and thanks for all the phish
How to avoid that hook at the end of a fraudster’s line
Don’t Let an Outdated Software Strategy Hold You Back
Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]
Enterprise file sync and share comes of age
The enterprise file sync and share market has truly come of age, with products and[...]
Managing Web and Mobile Security Risk
Securing the applications and services that underpin your online and mobile presence is one thing,[...]
Rethinking long term data management
The emerging role of active archiving
Managing Cloud Complexity
The emerging role of converged services
IT Decision-Making in the Digital Age
Making the right technology investments in today’s fast moving digital age can mean the difference[...]
Protecting data in your hyper-converged environment
In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]
A peek behind the AI bandwagon
When an important topic or trend gives rise to a marketing and media bandwagon, any[...]
Data encryption must be a priority for the digital business
Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]
Intelligent Systems in Action
As technology becomes smarter, more opportunities arise to exploit AI, machine learning and other forms[...]
Cyber Security Ownership and Responsibility
It’s easy to be caught out by a cyber attack or internal mistake that leads[...]
APIs and the Digital Enterprise
Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]
Building a Curated Digital Hub
In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]
Tackling End User Content Sprawl
In a nutshell The problem of content sprawl has been around since the early days[...]
Readers of The Register speak out on Thin Client technology
Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]
Network Security Solutions
IT Security is complex and trying to work out whether it is better to use[...]
Data Protection and Management in a Box
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]
Taking Cyber Security to the Next Level
As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]
Mobile Security and the Challenge of User Resistance
Mobile security is becoming more of a headache as the crossover between business and personal[...]
Future Proofing Your Network
Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]