Maintaining a robust, secure and compliant environment
The modern business depends on its IT systems running 24×7 and being available to users wherever they are, whatever device they use. Electronic data has also become critical, and the need to secure, protect and govern it grows continuously as external threats become more ubiquitous and as regulatory demands ramp up. The availability and security of IT systems and data is now a board room concern.
Our Content:
Mitigating AI Risks: 5 Essential Steps for Secure Adoption
Artificial intelligence (AI) and machine learning (ML) are finding their way into industries worldwide as[...]
View MoreChallenging the traditional boundaries between IAM and UEM
It’s always refreshing to engage with vendors who aren’t bound by the rigid category definitions[...]
View MoreMaking IT sustainability more objective and actionable
I’ve heard a lot of pitches from technology companies on how they can help customers[...]
View MoreTape is back on the main menu
The news that another of the big players in global file systems, Hammerspace, has integrated[...]
View MoreCan steel fences halt the march of cyber?
Cyber: for some, it’s a prefix that conjures up images of Dr Who’s silvery cyborg[...]
View MoreIt’s time to look again at IT and Software Asset Management
In the realm of IT administration, it’s all too easy to get stuck in familiar[...]
View MoreStandardized solution implementation services
Shorten time-to-value, reduce costs and risks, and future-proof your investment
View MoreDigital identity: the many images of you
More and more of the topics we deal with at Freeform Dynamics now also relate[...]
View MoreTrust: easy to lose, hard to recover
Here are just a few of the topics that my fellow Freeformers and I have[...]
View MoreGetting real about IT sustainability
From good intentions to tangible results through smart systems selection
View MoreHave you made the right platform choices to minimise risk?
Critical systems have to run and run…
View MoreS/4HANA without compromise
A modern ERP architecture needs a powerful and future-proof platform
View MoreDigital identity and opening up the smartwallet
When an 80 year-old relative asks you how she can use her phone to both[...]
View MoreSinging the key management blues
We need cryptographic keys, but who is going to manage them?
View MoreWhy does ransomware still work?
As someone who first encountered ransomware during the last millennium
View MoreRansomware teaches the importance of data protection
Several years ago, around the time that ransomware attacks started making the front pages
View MoreForget the ‘free’ software, the real value of open-source is the collaboration
Analyst Opinion: It’s a cliché, but why are we still reinventing wheels?
View MoreWhich is worse: noise, or the sound of silence?
Analyst Opinion: If you’re one of the many people who find offices too noisy
View MoreAchieving success with your S/4HANA proof of concept (POC)
What to consider when selecting platforms, tools and services
View MoreThe business need for simpler storage
What to consider when planning for modern IT in the hybrid cloud era
View MoreHow to boost supplier commitment without spending more money
Time to tune into those non-revenue goals
View MoreData governance in software testing
Throwback Thursday: this week we're going back to 2008
View MoreThe importance of modern data archiving
In today’s business world, the value of archiving is greater than ever
View MoreIdentity and access management revisited
A changing world demands simplification and an urgent focus on security
View MoreZero Trust: securing the endpoint
How continuous authentication could help secure the work-anywhere world
View MoreA new perspective on the modern workplace
Forward-looking lessons from real-life pandemic experiences
View MoreSafe and Effective Remote Working
Addressing immediate pandemic-related needs while laying foundations for the future
View MoreNetwork security in the spotlight
Understanding why it can go wrong is key to making the right investment decisions
View MoreWhy backup to flash
Analyst Blog: There are some things that simply have to happen, no matter how modern[...]
View MoreDigital workspace disasters and how to beat them
New roles for user management and app deployment in the digital workspace
View MoreDealing with the GDPR Challenge Infographic
The catalyst for a move to modern data protection
View MoreData Protection Revisited – Business
A risk review and investment guide for business executives
View MoreData Management for a Digital World
Turn GDPR compliance and ransomware defence to your advantage
View MoreCauses of software development woes
Respondents point the finger at ambiguous requirements
View MoreIntegrating Security Into the DNA of Your Software Lifecycle
“Masters” move beyond pure risk management to focus on business growth
View MoreRequirements-driven software development and quality management
Removing the ambiguity from your delivery pipeline
View MoreInformation management is going mainstream – at last!
Analyst opinion Some assumptions have been held by IT pros for so long that they[...]
View MoreGDPR’s latest gift? Class action privacy cases
Analyst opinion Europeans will in future be able to bring US-style class actions for (alleged)[...]
View MoreSo long, and thanks for all the phish
How to avoid that hook at the end of a fraudster’s line
View MoreDon’t Let an Outdated Software Strategy Hold You Back
Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]
View MoreEnterprise file sync and share comes of age
The enterprise file sync and share market has truly come of age, with products and[...]
View MoreManaging Web and Mobile Security Risk
Securing the applications and services that underpin your online and mobile presence is one thing,[...]
View MoreIT Decision-Making in the Digital Age
Making the right technology investments in today’s fast moving digital age can mean the difference[...]
View MoreProtecting data in your hyper-converged environment
In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]
View MoreA peek behind the AI bandwagon
When an important topic or trend gives rise to a marketing and media bandwagon, any[...]
View MoreData encryption must be a priority for the digital business
Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]
View MoreIntelligent Systems in Action
As technology becomes smarter, more opportunities arise to exploit AI, machine learning and other forms[...]
View MoreCyber Security Ownership and Responsibility
It’s easy to be caught out by a cyber attack or internal mistake that leads[...]
View MoreAPIs and the Digital Enterprise
Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]
View MoreBuilding a Curated Digital Hub
In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]
View MoreTackling End User Content Sprawl
In a nutshell The problem of content sprawl has been around since the early days[...]
View MoreReaders of The Register speak out on Thin Client technology
Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]
View MoreNetwork Security Solutions
IT Security is complex and trying to work out whether it is better to use[...]
View MoreData Protection and Management in a Box
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]
View MoreTaking Cyber Security to the Next Level
As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]
View MoreMobile Security and the Challenge of User Resistance
Mobile security is becoming more of a headache as the crossover between business and personal[...]
View MoreFuture Proofing Your Network
Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]
View MoreCloud and Security Challenges
Cloud adoption is taking place in organisations of all sizes. Internal cloud systems are being[...]
View MoreCloud Security Temperature Check
In a recent online survey in which responses were gathered from almost three hundred IT[...]
View MoreWhat scares you most about ‘the cloud’?
Cloud computing has gone mainstream. While a hard-core of naysayers still exists, the black-and-white negative[...]
View MoreEight Best Practices for Cloud Security
There’s been a lot of FUD spread around in recent years on the subject of[...]
View MoreData Protection and RAID
Rapid data growth, a greater emphasis on operational risk and developments in storage hardware are[...]
View MoreHyper-Scale Data Management
The term ‘Software Defined Storage’ is used to describe a wide range of ideas and[...]
View MoreThe ’feel-good’ factor is good for business
People who feel good while doing their job tend to work better, contribute more and[...]
View MoreSnooper-proofing laptops and tablets?
Given how important the company’s data is and the ever more stringent nature of the[...]
View MoreA new approach to verifying user identity
By Tony Lock We all know that trying to authenticate our users when they access[...]
View More21st century data protection: Get back up to date
In this webcast discover how you create a new architecture for backup and recovery, how[...]
View MoreSecurity policy and EU data protection regulation
Websense research finds that 40% of UK security professionals never speak to their executive board[...]
View MoreDisaster Recovery for the masses
Most organisations, even SMBs, have some sort of plans to deal with recovery from disasters,[...]
View MoreManage security in real time
You face more, and more dangerous threats every day – drive-by infections, APTs, executive targeted[...]
View MoreDo more of your apps deserve better DR?
What does IT disaster recovery (DR) mean to you? Does it bring to mind racks[...]
View MoreThe Democratization of IT Disaster Recovery
If it has been a while since you thought about your DR measures, or a[...]
View MoreHave you planned for a ’friendly’ DDoS attack?
Malicious Distributed Denial of Service (DDoS) attacks do not occur often. Nevertheless, for an enterprise[...]
View MoreMobile security is more than protecting local data
By now we’ve all heard the term Bring Your Own Device (BYOD). This phenomenon is[...]
View MoreWhat are APT’s?
What is an APT? APT stands for Advanced Persistent Threat. The goal of this form[...]
View MoreSecurity: the oft-forgotten dimension
Computer security is a hot topic today, and much talked about. There are endless emanations[...]
View MoreComputer Security: Knowing What You Don’t Know
100 per cent security is a fantasy: you will be attacked by both known and[...]
View MoreThe State of Network Infrastructure
By Tony Lock Networks are the glue that allow users to function effectively in their[...]
View MoreThe Death of the Corporate Network Perimeter
By Tony Lock In a recent survey over 400 respondents gave us the inside track[...]
View MoreJuggling Performance, Availability and Security
By Tony Lock A recent report from Freeform Dynamics illustrates that many corporate networks are[...]
View MoreControlling Application Access
Application performance, availability and security challenges are quietly creeping up in the context of internal[...]
View MoreThe Security Education Dilemma
By Charles Brett Security covers many dimensions, including the physical and logical. As such many[...]
View MoreAre we barking up the wrong mobile data protection tree?
By Charles Brett Professional IT prefers disciplined approaches which back up, or copy, all enterprise[...]
View MoreSoftware Defined Networking (SDN) continues to move forwards
By Charles Brett and Tony Lock During an Analyst Briefing at the IBM Development Laboratory[...]
View MoreThe Business Value of Data Protection
By Tony Lock The data held in every business is valuable and in the current[...]
View MoreDevice Proliferation and Data Fragmentation
By Tony Lock Bring your own device (BYOD) continues to attract considerable attention, but the[...]
View MoreData fragmentation challenges for CIOs
By Tony Lock A recent survey by Freeform Dynamics confirmed that access to accurate information[...]
View MoreThe End User Security Jigsaw
Organisations of all sizes are trying to understand the security implications of mobile working, device[...]
View MoreThe Data Protection Imperative
In this short paper, we spell out why the time has come to adopt a[...]
View MoreData Protection as a Business Enabler
While the importance of business information is almost universally recognised, few organisations have enjoyed either[...]
View MoreStorage Anywhere and Everywhere
With more departmental applications, collaboration and sharing environments, and even cloud-based services, with access via[...]
View MoreManaging expanding business – Critical Linux workloads
Evidence from users in the real world shows that for large workloads, the mainframe offers[...]
View MoreDCIM and Energy Management
By Tony Lock Over several decades IT management has focussed almost exclusively on keeping servers[...]
View MoreWorkload placement in a hybrid world
Research shows that you are going to mix your platforms and deployment models in the[...]
View MoreSecurity, privacy and data protection
By Tony Lock Many businesses today are faced with the challenge of rapidly fluctuating operating[...]
View MoreYour local Public Cloud
By Andrew Buss A few weeks back we looked at the role that private and[...]
View MoreFreedom without Anarchy
Empowering employees through the delegation of authority and trust can enhance innovation and productivity. But[...]
View MoreAnalytics and Big Data
By Tony Lock ‘Big Data’ is a hot topic receiving considerable attention from the marketing[...]
View MoreWhy you need an interactive archive
Many organisations today only archive data when there is some external legislative driver forcing their[...]
View MoreBig Data and Analytics
Results of a web survey illustrate the state of business information and analytics today. Just[...]
View MoreA more intelligent approach to security
At the RSA Conference 2012 in London, one of the key themes to emerge was[...]
View MoreDatacentre in a box – Something for everyone?
CIOs have a tough job delivering an expanding range of services to ever more demanding[...]
View MoreThe Big Data Revolution
Big Data suffers misuse but at its heart is really about getting more value from[...]
View MoreWhat should CIOs be demanding of Storage Vendors?
In most organisations the acquisition of storage and its associated management tools was, until recently,[...]
View MorePersonal Use of a Windows Tablet in Business – It’s ready for operational use
There is no doubt that “Tablet” devices and “Slates” are attracting a lot of attention[...]
View MoreAgility without anxiety
Dale Vile met up with Perforce’s Mark Warren to discuss how to do agile development[...]
View MoreThe Rise of User Centric IT – Is the consumerisation of IT a benefit to anyone?
There is a long history of end users wanting, or ‘needing’, to have ‘different’ tools[...]
View MoreBalancing storage efficiency and data security
We know from our many studies that most IT organisations are stretched operationally while having[...]
View MoreSiloed approach to IT security increases business risk
It is said that the technology at the heart of IT changes at a bewildering[...]
View MorePlaying the SLA long game
By Dale Vile When IT is your day job it’s easy to lose sight of[...]
View MorePrivate Cloud Forecast – Sunny or Stormy times ahead for CIOs?
Businesses are still operating under enormous economic pressure and, as would be expected, this continues[...]
View MoreAnalyst Headlines: Securing the Data Center
Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]
View MoreBehind the Headlines: Securing the Data Center
Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]
View MoreAnalyst Headlines: Securing the Access
Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]
View MoreBehind the Headlines: Securing the Access
Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]
View MoreAnalyst Headlines: Securing the Wide Area
Andrew Buss discusses how security needs to become embedded and automated within the network and[...]
View MoreBehind the Headlines: Securing the Wide Area
Andrew Buss discusses how security needs to become embedded and automated within the network and[...]
View MoreBPM from back office to front office and beyond
Are you tough enough to take on BPM and win? Someone has to. It has[...]
View MoreEnergy Aware Planning and Decision Making
Energy availability and management is increasingly becoming an important agenda item for IT leaders, but[...]
View MoreSeven enablers of effective disaster recovery for SMEs
By Tony Lock In a nutshell: Recent research carried out by Freeform Dynamics identified seven[...]
View MoreKey points to highlight when selling storage
Organisations of all shapes and sizes are struggling to deal with the rapid growth of[...]
View MoreFast Forward to Big Data
Does ’cloud’ have a roll in providing customers with access to new data sources to[...]
View MoreThe great DR divide
Business continuity solutions only for large organisations? IT vendors and consulting firms who sell disaster[...]
View MoreUser Virtualization – Moving beyond device-centric computing
When business IT was young and channel partners had plenty of hardware margins to play[...]
View MoreWinners and losers in the information race
The mainstream media generally portrays the financial services industry as being in a total mess,[...]
View MoreThe secrets of effective disaster recovery
There’s no magic bullet, but there’s a formula Many IT and business executives groan when[...]
View MoreClosing the SMB security gap
It’s got the point where the majority of small and medium businesses (SMBs) take the[...]
View MoreData retention, FOI and the storage budget
The data retention policy in too many organisations has historically boiled down to ‘keep everything[...]
View MoreThe storage boom and bust cycle
More data more often than not means more disks. It was ever thus – but[...]
View MoreThe consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready
If media headlines and vendor claims are to be believed, organisations today are faced with[...]
View MoreEnabling Rapid and Effective IT Recovery
IT vendors have traditionally targeted the lucrative large enterprise market with their data protection and[...]
View MoreDisaster Recovery in European SMBs
By Tony Lock, Martha Bennett and Dale Vile KEY POINTS The term ‘disaster recovery’ is[...]
View MoreThe Consumerisation of IT (Slides)
Audience – IT & Business professionals Occasion – VMUG Meeting, Leeds, October 2011 Presenter(s) –[...]
View MoreThe SME security challenge
Over the years, research findings have consistently demonstrated widespread exposure to risk when it comes[...]
View MoreTime to get serious about managing security
Do you know what’s running in your network? In this time of ever increasing security[...]
View MoreCompliance: The legal landscape and how to navigate it
Every IT professional recognises the importance of securing the IT systems on which critical business[...]
View MoreThe evolution of desktop security
The operating habits of users render passwords as the primary mechanism to secure any application[...]
View MoreThe workload challenge
Today, IT Infrastructure is evolving at a tremendous pace. The Mainframe computer, now often referred[...]
View MoreRSA hack demonstrates need for proactive security and multi-layer protection
The recent news that RSA Security suffered a security attack and breach that resulted in[...]
View MoreTrust and security in the cloud
By Andrew Buss & Dale Vile KEY FINDINGS Many companies could do much better when[...]
View MoreThe realities of SaaS and Security
With upgrades to Windows 7 and Office 2010 high on the agenda, questions are being[...]
View MoreSaaS suppliers are no black box, evaluation is key
An aspect of cloud computing that is often overlooked is supplier evaluation and management. We[...]
View MoreSaaS security: it comes down to knowing what you are doing
A lot of things have happened recently that may cause us to think twice about[...]
View MoreSaaS providers – The good, the bad and the ugly
Interested in software as a service (SaaS) but worried about the risks to your information?[...]
View MoreBuying into the cloud
A lot of companies are reporting that individual departments and even business users are adopting[...]
View MoreSoftware as a service can breed dependency so choose suppliers with care
Cloud computing is frequently likened to utility services such as electricity, water or gas. If[...]
View MoreThe weakest link in Software as a Service
The delivery of cloud based application functionality via the Software as a Service (SaaS) model[...]
View MoreSecure your departmental apps
Throughout a workshop on The Register, we’ve been looking at resiliency and security for hosted[...]
View MoreWhat you think about SaaS
Throughout a workshop conducted on The Register, we have been looking at the factors that[...]
View MoreWhose data is it anyway?
Losing control of one’s data is among the first concerns that arise when software as[...]
View MorePutting the SaaS into security management
In all areas of business, security and privacy are built on good policy, properly applied.[...]
View MoreIs cloud data secure?
Would your data be more secure in the hands of Google or left where it[...]
View MoreA question of performance
Software as a service (SaaS) promises a lot but many are still nervous about relying[...]
View MoreTrust and risk in the cloud
Stick enough kit and multi-tenant software in one huge data centre and there is no[...]
View MoreWhat is the point of End Point Protection?
How we should be protecting our PCs Security threats have existed for almost as long[...]
View MoreThe alternatives to password protection
In a world where it is possible to create credential-stealing malware and where users are[...]
View MoreThe perception and reality of cloud security
Some back to front thinking in evidence? One of the most frequent concerns about cloud[...]
View MoreModern solutions to an ever-growing challenge
What could be new about backup and recovery? After all, everyone has been doing it[...]
View MoreDisaster recovery blurs into high availability (or other way round?)
IT managers use two terms when talking about systems availability. These are: High Availability or[...]
View MoreShaping your next desktop upgrade
The economic downturn caused many companies to delay their desktop and notebook refresh plans, but[...]
View MoreThe industrialisation of the IT Threat Landscape
Business and IT are now changing with a rapidity never before seen while at the[...]
View MoreCIOs and ’Data Protection’
By Tony Lock The rapid growth in the amount of stored data means that the[...]
View MoreData encryption adoption represents a significant opportunity
By Andrew Buss Data protection continues to be a top of mind subject for many[...]
View MoreKeys to data encryption adoption
Data protection remains top-of-mind for many companies. Data losses continue across both public and private[...]
View MoreThe threat and promise of server virtualisation security
Given that IT security is all about understanding, and mitigating risks, it is inevitably going[...]
View MoreMoving beyond user rights – Protecting data first
It goes without saying that IT systems should, in principle, be secured so that only[...]
View MoreIs there a case for encrypting backups?
For most organisations, backups form an essential part of the day to day activities of[...]
View MoreManaging IT and business risk in the times of eroding enterprise boundaries
Managing risk in business has always been more of an art form than a science.[...]
View MoreSolvency II: Threat or Opportunity?
By Dale Vile and Jon Collins INTRODUCTION The emergence of new regulation always presents a[...]
View MoreCollaboration, complexity and compliance
The trouble with some terms we use in IT is that they take on a[...]
View MoreWho cares about encryption?
We’re used to getting a hundred or so responses from the mini-polls we run, but[...]
View MoreThe terror beyond the firewall
“The office” is fast becoming, for many organisations, a thing of the past – at[...]
View MoreDoing the right thing on ID management isn’t enough. It’s proving that you did it
In a previous article we looked at Identity Management and access provisioning as an end[...]
View MoreThose demanding mobile users
For years, when we asked Reg readers what worried them about mobile, “security” was top[...]
View MoreThe cloud’s impact on security?
We tried to get through this workshop without using the five letter C-word, but we[...]
View MoreMobile technology and security
By Josie Sephton In a nutshell: The issue of security when thinking about flexible working[...]
View MoreThreat or opportunity?
By Martin Atherton In a nutshell: When it comes to data protection and information security[...]
View MoreDriving With the Brakes On
By Jon Collins In a nutshell: While much attention around information risk is on medium[...]
View MoreSecurity – policies, processes and people
The problem with building foolproof systems, so the saying goes, is that the world seems[...]
View MoreDoes business really care about security?
I once read a book that said, among other things, “You can never truly give[...]
View MoreDelivering on data governance – Making sure IT’s glass is half full
Data governance can be dismissed as ‘applied common sense’, or balked at as an impossible[...]
View MoreShould we be encrypting backups?
We all know that data protection regulations are gaining teeth. As we discussed before, it[...]
View MoreIs it possible to measure IT Security?
It is a commonly held principle in many areas of business that if you can’t[...]
View MoreDelivering a secure information infrastructure
I recently had the task of writing an explanatory paper about Good Practice Guide (GPG)[...]
View MoreProtective Monitoring
by Jon Collins and Martin Atherton MAIN POINTS CESG (Communications and Electronic Security Group) Good[...]
View MoreThe impact of virtualisation on securing systems
Virtualisation has become an established trend in the x86 server market and is moving into[...]
View MoreUsing systems management tools in IT security
Every IT professional recognises the importance of securing the IT systems that are now at[...]
View MoreThe evolving role of the IT security manager
Security has long been the poor cousin of IT. As any security professional knows, the[...]
View MoreSecuring Your Network
In this three part podcast Jason Stamper, editor at CBR, talks to Jon Collins and[...]
View MoreData security strategies and drivers
Audience – Sales and pre-sales audience selling to large enterprises and government Occasion – Annual[...]
View MoreSecurity: Get the board on board
While the principles of IT security are relatively timeless and straightforward to understand, technology itself[...]
View MoreRethinking security. Just what are you trying to secure?
Ask any IT manager, business leader or regulator and they will tell you that IT[...]
View MoreApplication Retirement: What about the Data?
by Jon Collins and Martin Atherton Introducing application retirement: what’s really important to you? Whatever[...]
View MoreShould all hard drives be encrypted?
Given the origins of computing in the coding and decoding of messages, it’s fair to[...]
View MoreSecuring the Un-securable?
Audience – IT security practitioners and academics Occasion – BCS Information Security Special Interest Group[...]
View MoreDedication to regulation
By Martin Atherton Regulation is a fact of life and business. The signs are that[...]
View MoreVirtualisation and Security
As x86 / x64 server virtualisation moves into everyday operations, what impact does it have[...]
View MoreData protection and identity management – are you sure you’re safe?
Data protection is an essential area for businesses, and an increasingly critical one to deal[...]
View MoreIs your data safe – and accessible?
Data protection has been a requirement and an obligation for organisations of all sizes since[...]
View MoreThreat predictions for 2010
Jon Collins and Paul Wood of MessageLabs give their predictions for the coming year on[...]
View MoreHow bad are the bad guys?
By Jon Collins The Internet has come a long way since its rudimentary beginnings as[...]
View MoreLooking at the threat landscape – It’s getting scary out there….
Jon Collins and MessageLabs’ Paul Wood examine some of the current threats we all face,[...]
View MoreDelivering on identity and access management
By Jon Collins At a recent panel event involving senior security managers and chief information[...]
View MoreMaking IT Work In The Real World
Most organisations run a mix of systems in their IT infrastructure. One of the challenges[...]
View MoreIT security and Governance
By Jon Collins It has sometimes been said that in Information Technology, the emphasis has[...]
View MoreData Retention
by Jon Collins and Martin Atherton Earlier last year we conducted some research on the[...]
View MoreResiliency in the Real World
by Tony Lock A recent report by Freeform Dynamics shows that IT systems fail. What‟s[...]
View MoreThe Impact of IT Security Attitudes
by Jon Collins Much has been written about the existence of various threats, internal and[...]
View MoreEmail resiliency and the SMB
by Martin Atherton For most businesses, IT is linked to multiple facets of activity: product[...]
View MoreSecure USB
by Jon Collins When the USB standard was first launched, few would have imagined the[...]
View MoreRisk and Resilience
The application availability gamble The modern business is highly dependent on IT. When systems go[...]
View MoreWhat governance can really mean to business
by Martin Atherton Governance is a term you’ll have heard bandied about a lot, usually[...]
View MoreData Governance in the Software Lifecycle
by Martin Atherton, Jon Collins and Dale Vile Many organisations have been driving improvements in[...]
View MoreData Governance in Software Testing
by Jon Collins In the research report Data Governance in the Software Lifecycle we consider[...]
View MoreInformation Governance
by Martin Atherton and Jon Collins Forward thinking organisations no longer just talk about governance,[...]
View MoreSecurity no longer just about hackers
by Jon Collins I went to a fascinating panel session a couple of weeks ago,[...]
View MoreCentrally Managed Protection of Critical Business Content
By Jon Collins and David Perry The last few years have seen a revolution in[...]
View More