Category Archives: IT Security, Risk & ESG

Cyber Security Ownership and Responsibility

It’s easy to be caught out by a cyber attack or internal mistake that leads[...]

APIs and the Digital Enterprise

Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]

Building a Curated Digital Hub

In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]

Tackling End User Content Sprawl

In a nutshell The problem of content sprawl has been around since the early days[...]

Readers of The Register speak out on Thin Client technology

Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]

Network Security Solutions

IT Security is complex and trying to work out whether it is better to use[...]

Data Protection and Management in a Box

In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]

Taking Cyber Security to the Next Level

As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]

Mobile Security and the Challenge of User Resistance

Mobile security is becoming more of a headache as the crossover between business and personal[...]

Future Proofing Your Network

Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]

Cloud and Security Challenges

Cloud adoption is taking place in organisations of all sizes. Internal cloud systems are being[...]

Cloud Security Temperature Check

In a recent online survey in which responses were gathered from almost three hundred IT[...]

What scares you most about ‘the cloud’?

Cloud computing has gone mainstream. While a hard-core of naysayers still exists, the black-and-white negative[...]

Eight Best Practices for Cloud Security

There’s been a lot of FUD spread around in recent years on the subject of[...]

Data Protection and RAID

Rapid data growth, a greater emphasis on operational risk and developments in storage hardware are[...]

Hyper-Scale Data Management

The term ‘Software Defined Storage’ is used to describe a wide range of ideas and[...]

The ’feel-good’ factor is good for business

People who feel good while doing their job tend to work better, contribute more and[...]

Snooper-proofing laptops and tablets?

Given how important the company’s data is and the ever more stringent nature of the[...]

A new approach to verifying user identity

By Tony Lock We all know that trying to authenticate our users when they access[...]

21st century data protection: Get back up to date

In this webcast discover how you create a new architecture for backup and recovery, how[...]

Security policy and EU data protection regulation

Websense research finds that 40% of UK security professionals never speak to their executive board[...]

Disaster Recovery for the masses

Most organisations, even SMBs, have some sort of plans to deal with recovery from disasters,[...]

Manage security in real time

You face more, and more dangerous threats every day – drive-by infections, APTs, executive targeted[...]

© Freeform Dynamics Limited - 2006 - 2024. All rights reserved. Unauthorised use of copy is not permitted.