Category Archives: IT Security, Risk & ESG

Getting a grip on the GDPR

Here's our tips on how to plan rather than panic

So long, and thanks for all the phish

How to avoid that hook at the end of a fraudster’s line

Don’t Let an Outdated Software Strategy Hold You Back

Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]

Enterprise file sync and share comes of age

The enterprise file sync and share market has truly come of age, with products and[...]

Managing Web and Mobile Security Risk

Securing the applications and services that underpin your online and mobile presence is one thing,[...]

Rethinking long term data management

The emerging role of active archiving

Managing Cloud Complexity

The emerging role of converged services

IT Decision-Making in the Digital Age

Making the right technology investments in today’s fast moving digital age can mean the difference[...]

Protecting data in your hyper-converged environment

In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]

A peek behind the AI bandwagon

When an important topic or trend gives rise to a marketing and media bandwagon, any[...]

Data encryption must be a priority for the digital business

Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]

Intelligent Systems in Action

As technology becomes smarter, more opportunities arise to exploit AI, machine learning and other forms[...]

Cyber Security Ownership and Responsibility

It’s easy to be caught out by a cyber attack or internal mistake that leads[...]

APIs and the Digital Enterprise

Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]

Building a Curated Digital Hub

In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]

Tackling End User Content Sprawl

In a nutshell The problem of content sprawl has been around since the early days[...]

Readers of The Register speak out on Thin Client technology

Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]

Network Security Solutions

IT Security is complex and trying to work out whether it is better to use[...]

Data Protection and Management in a Box

In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]

Taking Cyber Security to the Next Level

As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]

Mobile Security and the Challenge of User Resistance

Mobile security is becoming more of a headache as the crossover between business and personal[...]