Category Archives: IT Security, Risk & ESG
Closing the SMB security gap
It’s got the point where the majority of small and medium businesses (SMBs) take the[...]
Data retention, FOI and the storage budget
The data retention policy in too many organisations has historically boiled down to ‘keep everything[...]
The storage boom and bust cycle
More data more often than not means more disks. It was ever thus – but[...]
The consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready
If media headlines and vendor claims are to be believed, organisations today are faced with[...]
Enabling Rapid and Effective IT Recovery
IT vendors have traditionally targeted the lucrative large enterprise market with their data protection and[...]
Disaster Recovery in European SMBs
By Tony Lock, Martha Bennett and Dale Vile KEY POINTS The term ‘disaster recovery’ is[...]
The Consumerisation of IT (Slides)
Audience – IT & Business professionals Occasion – VMUG Meeting, Leeds, October 2011 Presenter(s) –[...]
The SME security challenge
Over the years, research findings have consistently demonstrated widespread exposure to risk when it comes[...]
Time to get serious about managing security
Do you know what’s running in your network? In this time of ever increasing security[...]
Compliance: The legal landscape and how to navigate it
Every IT professional recognises the importance of securing the IT systems on which critical business[...]
The evolution of desktop security
The operating habits of users render passwords as the primary mechanism to secure any application[...]
The workload challenge
Today, IT Infrastructure is evolving at a tremendous pace. The Mainframe computer, now often referred[...]
RSA hack demonstrates need for proactive security and multi-layer protection
The recent news that RSA Security suffered a security attack and breach that resulted in[...]
Trust and security in the cloud
By Andrew Buss & Dale Vile KEY FINDINGS Many companies could do much better when[...]
The realities of SaaS and Security
With upgrades to Windows 7 and Office 2010 high on the agenda, questions are being[...]
SaaS suppliers are no black box, evaluation is key
An aspect of cloud computing that is often overlooked is supplier evaluation and management. We[...]
SaaS security: it comes down to knowing what you are doing
A lot of things have happened recently that may cause us to think twice about[...]
SaaS providers – The good, the bad and the ugly
Interested in software as a service (SaaS) but worried about the risks to your information?[...]
Buying into the cloud
A lot of companies are reporting that individual departments and even business users are adopting[...]
Software as a service can breed dependency so choose suppliers with care
Cloud computing is frequently likened to utility services such as electricity, water or gas. If[...]
The weakest link in Software as a Service
The delivery of cloud based application functionality via the Software as a Service (SaaS) model[...]
Secure your departmental apps
Throughout a workshop on The Register, we’ve been looking at resiliency and security for hosted[...]
What you think about SaaS
Throughout a workshop conducted on The Register, we have been looking at the factors that[...]
Whose data is it anyway?
Losing control of one’s data is among the first concerns that arise when software as[...]