Category Archives: IT Security, Risk & ESG
Getting a grip on the GDPR
Here's our tips on how to plan rather than panic
So long, and thanks for all the phish
How to avoid that hook at the end of a fraudster’s line
Don’t Let an Outdated Software Strategy Hold You Back
Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]
Enterprise file sync and share comes of age
The enterprise file sync and share market has truly come of age, with products and[...]
Managing Web and Mobile Security Risk
Securing the applications and services that underpin your online and mobile presence is one thing,[...]
Rethinking long term data management
The emerging role of active archiving
Managing Cloud Complexity
The emerging role of converged services
IT Decision-Making in the Digital Age
Making the right technology investments in today’s fast moving digital age can mean the difference[...]
Protecting data in your hyper-converged environment
In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]
A peek behind the AI bandwagon
When an important topic or trend gives rise to a marketing and media bandwagon, any[...]
Data encryption must be a priority for the digital business
Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]
Intelligent Systems in Action
As technology becomes smarter, more opportunities arise to exploit AI, machine learning and other forms[...]
Cyber Security Ownership and Responsibility
It’s easy to be caught out by a cyber attack or internal mistake that leads[...]
APIs and the Digital Enterprise
Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]
Building a Curated Digital Hub
In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]
Tackling End User Content Sprawl
In a nutshell The problem of content sprawl has been around since the early days[...]
Readers of The Register speak out on Thin Client technology
Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]
Network Security Solutions
IT Security is complex and trying to work out whether it is better to use[...]
Data Protection and Management in a Box
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]
Taking Cyber Security to the Next Level
As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]
Mobile Security and the Challenge of User Resistance
Mobile security is becoming more of a headache as the crossover between business and personal[...]