Category Archives: IT Security, Risk & ESG
Enterprise file sync and share comes of age
The enterprise file sync and share market has truly come of age, with products and[...]
Managing Web and Mobile Security Risk
Securing the applications and services that underpin your online and mobile presence is one thing,[...]
Rethinking long term data management
The emerging role of active archiving
Managing Cloud Complexity
The emerging role of converged services
IT Decision-Making in the Digital Age
Making the right technology investments in today’s fast moving digital age can mean the difference[...]
Protecting data in your hyper-converged environment
In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]
A peek behind the AI bandwagon
When an important topic or trend gives rise to a marketing and media bandwagon, any[...]
Data encryption must be a priority for the digital business
Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]
Intelligent Systems in Action
As technology becomes smarter, more opportunities arise to exploit AI, machine learning and other forms[...]
Cyber Security Ownership and Responsibility
It’s easy to be caught out by a cyber attack or internal mistake that leads[...]
APIs and the Digital Enterprise
Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]
Building a Curated Digital Hub
In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]
Tackling End User Content Sprawl
In a nutshell The problem of content sprawl has been around since the early days[...]
Readers of The Register speak out on Thin Client technology
Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]
Network Security Solutions
IT Security is complex and trying to work out whether it is better to use[...]
Data Protection and Management in a Box
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]
Taking Cyber Security to the Next Level
As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]
Mobile Security and the Challenge of User Resistance
Mobile security is becoming more of a headache as the crossover between business and personal[...]
Future Proofing Your Network
Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]
Cloud and Security Challenges
Cloud adoption is taking place in organisations of all sizes. Internal cloud systems are being[...]
Cloud Security Temperature Check
In a recent online survey in which responses were gathered from almost three hundred IT[...]
What scares you most about ‘the cloud’?
Cloud computing has gone mainstream. While a hard-core of naysayers still exists, the black-and-white negative[...]
Eight Best Practices for Cloud Security
There’s been a lot of FUD spread around in recent years on the subject of[...]