Category Archives: IT Security, Risk & ESG

SaaS suppliers are no black box, evaluation is key

An aspect of cloud computing that is often overlooked is supplier evaluation and management. We[...]

SaaS security: it comes down to knowing what you are doing

A lot of things have happened recently that may cause us to think twice about[...]

SaaS providers – The good, the bad and the ugly

Interested in software as a service (SaaS) but worried about the risks to your information?[...]

Buying into the cloud

A lot of companies are reporting that individual departments and even business users are adopting[...]

Software as a service can breed dependency so choose suppliers with care

Cloud computing is frequently likened to utility services such as electricity, water or gas. If[...]

The weakest link in Software as a Service

The delivery of cloud based application functionality via the Software as a Service (SaaS) model[...]

Secure your departmental apps

Throughout a workshop on The Register, we’ve been looking at resiliency and security for hosted[...]

What you think about SaaS

Throughout a workshop conducted on The Register, we have been looking at the factors that[...]

Whose data is it anyway?

Losing control of one’s data is among the first concerns that arise when software as[...]

Putting the SaaS into security management

In all areas of business, security and privacy are built on good policy, properly applied.[...]

Is cloud data secure?

Would your data be more secure in the hands of Google or left where it[...]

A question of performance

Software as a service (SaaS) promises a lot but many are still nervous about relying[...]

Trust and risk in the cloud

Stick enough kit and multi-tenant software in one huge data centre and there is no[...]

What is the point of End Point Protection?

How we should be protecting our PCs Security threats have existed for almost as long[...]

The alternatives to password protection

In a world where it is possible to create credential-stealing malware and where users are[...]

The perception and reality of cloud security

Some back to front thinking in evidence? One of the most frequent concerns about cloud[...]

Modern solutions to an ever-growing challenge

What could be new about backup and recovery? After all, everyone has been doing it[...]

Disaster recovery blurs into high availability (or other way round?)

IT managers use two terms when talking about systems availability. These are: High Availability or[...]

Shaping your next desktop upgrade

The economic downturn caused many companies to delay their desktop and notebook refresh plans, but[...]

The industrialisation of the IT Threat Landscape

Business and IT are now changing with a rapidity never before seen while at the[...]

CIOs and ’Data Protection’

By Tony Lock The rapid growth in the amount of stored data means that the[...]

Data encryption adoption represents a significant opportunity

By Andrew Buss Data protection continues to be a top of mind subject for many[...]

Keys to data encryption adoption

Data protection remains top-of-mind for many companies. Data losses continue across both public and private[...]

The threat and promise of server virtualisation security

Given that IT security is all about understanding, and mitigating risks, it is inevitably going[...]

© Freeform Dynamics Limited - 2006 - 2024. All rights reserved. Unauthorised use of copy is not permitted.