Maintaining a robust, secure and compliant environment

The modern business depends on its IT systems running 24×7 and being available to users wherever they are, whatever device they use. Electronic data has also become critical, and the need to secure, protect and govern it grows continuously as external threats become more ubiquitous and as regulatory demands ramp up. The availability and security of IT systems and data is now a board room concern.

Our Content:

Mitigating AI Risks: 5 Essential Steps for Secure Adoption

Artificial intelligence (AI) and machine learning (ML) are finding their way into industries worldwide as[...]

View More
Challenging the traditional boundaries between IAM and UEM

It’s always refreshing to engage with vendors who aren’t bound by the rigid category definitions[...]

View More
Making IT sustainability more objective and actionable

I’ve heard a lot of pitches from technology companies on how they can help customers[...]

View More
The politics and practicalities of sustainable IT

A senior leadership perspective

View More
Tape is back on the main menu

The news that another of the big players in global file systems, Hammerspace, has integrated[...]

View More
Can steel fences halt the march of cyber?

Cyber: for some, it’s a prefix that conjures up images of Dr Who’s silvery cyborg[...]

View More
It’s time to look again at IT and Software Asset Management

In the realm of IT administration, it’s all too easy to get stuck in familiar[...]

View More
Standardized solution implementation services

Shorten time-to-value, reduce costs and risks, and future-proof your investment

View More
Digital identity: the many images of you

More and more of the topics we deal with at Freeform Dynamics now also relate[...]

View More
Trust: easy to lose, hard to recover

Here are just a few of the topics that my fellow Freeformers and I have[...]

View More
Getting real about IT sustainability

From good intentions to tangible results through smart systems selection

View More
Have you made the right platform choices to minimise risk?

Critical systems have to run and run…

View More
S/4HANA without compromise

A modern ERP architecture needs a powerful and future-proof platform

View More
Digital identity and opening up the smartwallet

When an 80 year-old relative asks you how she can use her phone to both[...]

View More
Linux and sustainability

The emerging role of modern, high-scale consolidation platforms

View More
Singing the key management blues

We need cryptographic keys, but who is going to manage them?

View More
Why does ransomware still work?

As someone who first encountered ransomware during the last millennium

View More
Ransomware teaches the importance of data protection

Several years ago, around the time that ransomware attacks started making the front pages

View More
Forget the ‘free’ software, the real value of open-source is the collaboration

Analyst Opinion: It’s a cliché, but why are we still reinventing wheels?

View More
Which is worse: noise, or the sound of silence?

Analyst Opinion: If you’re one of the many people who find offices too noisy

View More
Achieving success with your S/4HANA proof of concept (POC)

What to consider when selecting platforms, tools and services

View More
The business need for simpler storage

What to consider when planning for modern IT in the hybrid cloud era

View More
How to boost supplier commitment without spending more money

Time to tune into those non-revenue goals

View More
Data governance in software testing

Throwback Thursday: this week we're going back to 2008

View More
The importance of modern data archiving

In today’s business world, the value of archiving is greater than ever

View More
Covid quick fix payback time

How long will people put up with the emergency fixes?

View More
Dispelling the myth of the industry-standard server

What you thought you knew has changed

View More
Identity and access management revisited

A changing world demands simplification and an urgent focus on security

View More
Zero Trust: securing the endpoint

How continuous authentication could help secure the work-anywhere world

View More
A new perspective on the modern workplace

Forward-looking lessons from real-life pandemic experiences

View More
Safe and Effective Remote Working

Addressing immediate pandemic-related needs while laying foundations for the future

View More
Network security in the spotlight

Understanding why it can go wrong is key to making the right investment decisions

View More
Lifecycle Management of HCI Systems

Every element of the solution needs attention

View More
Why backup to flash

Analyst Blog: There are some things that simply have to happen, no matter how modern[...]

View More
Digital workspace disasters and how to beat them

New roles for user management and app deployment in the digital workspace

View More
Managing Software Exposure

Time to fully embed security into your application lifecycle

View More
Dealing with the GDPR Challenge Infographic

The catalyst for a move to modern data protection

View More
Data Protection Revisited – Business

A risk review and investment guide for business executives

View More
Data Protection Revisited – IT

A risk review and investment guide for IT professionals

View More
All-in-one Data Protection

Taking the pain out of information management

View More
GDPR: the Security Dimension

Information security, governance and regulation in harmony

View More
Data Management for a Digital World

Turn GDPR compliance and ransomware defence to your advantage

View More
Causes of software development woes

Respondents point the finger at ambiguous requirements

View More
Integrating Security Into the DNA of Your Software Lifecycle

“Masters” move beyond pure risk management to focus on business growth

View More
Requirements-driven software development and quality management

Removing the ambiguity from your delivery pipeline

View More
Information management is going mainstream – at last!

Analyst opinion Some assumptions have been held by IT pros for so long that they[...]

View More
GDPR’s latest gift? Class action privacy cases

Analyst opinion Europeans will in future be able to bring US-style class actions for (alleged)[...]

View More
Getting a grip on the GDPR

Here's our tips on how to plan rather than panic

View More
So long, and thanks for all the phish

How to avoid that hook at the end of a fraudster’s line

View More
Don’t Let an Outdated Software Strategy Hold You Back

Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]

View More
Enterprise file sync and share comes of age

The enterprise file sync and share market has truly come of age, with products and[...]

View More
Managing Web and Mobile Security Risk

Securing the applications and services that underpin your online and mobile presence is one thing,[...]

View More
Rethinking long term data management

The emerging role of active archiving

View More
Managing Cloud Complexity

The emerging role of converged services

View More
IT Decision-Making in the Digital Age

Making the right technology investments in today’s fast moving digital age can mean the difference[...]

View More
Protecting data in your hyper-converged environment

In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]

View More
A peek behind the AI bandwagon

When an important topic or trend gives rise to a marketing and media bandwagon, any[...]

View More
Data encryption must be a priority for the digital business

Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]

View More
Intelligent Systems in Action

As technology becomes smarter, more opportunities arise to exploit AI, machine learning and other forms[...]

View More
Cyber Security Ownership and Responsibility

It’s easy to be caught out by a cyber attack or internal mistake that leads[...]

View More
APIs and the Digital Enterprise

Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]

View More
Building a Curated Digital Hub

In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]

View More
Tackling End User Content Sprawl

In a nutshell The problem of content sprawl has been around since the early days[...]

View More
Readers of The Register speak out on Thin Client technology

Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]

View More
Network Security Solutions

IT Security is complex and trying to work out whether it is better to use[...]

View More
Data Protection and Management in a Box

In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]

View More
Taking Cyber Security to the Next Level

As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]

View More
Mobile Security and the Challenge of User Resistance

Mobile security is becoming more of a headache as the crossover between business and personal[...]

View More
Future Proofing Your Network

Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]

View More
Cloud and Security Challenges

Cloud adoption is taking place in organisations of all sizes. Internal cloud systems are being[...]

View More
Cloud Security Temperature Check

In a recent online survey in which responses were gathered from almost three hundred IT[...]

View More
What scares you most about ‘the cloud’?

Cloud computing has gone mainstream. While a hard-core of naysayers still exists, the black-and-white negative[...]

View More
Eight Best Practices for Cloud Security

There’s been a lot of FUD spread around in recent years on the subject of[...]

View More
Data Protection and RAID

Rapid data growth, a greater emphasis on operational risk and developments in storage hardware are[...]

View More
Hyper-Scale Data Management

The term ‘Software Defined Storage’ is used to describe a wide range of ideas and[...]

View More
The ’feel-good’ factor is good for business

People who feel good while doing their job tend to work better, contribute more and[...]

View More
Snooper-proofing laptops and tablets?

Given how important the company’s data is and the ever more stringent nature of the[...]

View More
A new approach to verifying user identity

By Tony Lock We all know that trying to authenticate our users when they access[...]

View More
21st century data protection: Get back up to date

In this webcast discover how you create a new architecture for backup and recovery, how[...]

View More
Security policy and EU data protection regulation

Websense research finds that 40% of UK security professionals never speak to their executive board[...]

View More
Disaster Recovery for the masses

Most organisations, even SMBs, have some sort of plans to deal with recovery from disasters,[...]

View More
Manage security in real time

You face more, and more dangerous threats every day – drive-by infections, APTs, executive targeted[...]

View More
Do more of your apps deserve better DR?

What does IT disaster recovery (DR) mean to you? Does it bring to mind racks[...]

View More
The Democratization of IT Disaster Recovery

If it has been a while since you thought about your DR measures, or a[...]

View More
Have you planned for a ’friendly’ DDoS attack?

Malicious Distributed Denial of Service (DDoS) attacks do not occur often. Nevertheless, for an enterprise[...]

View More
Mobile security is more than protecting local data

By now we’ve all heard the term Bring Your Own Device (BYOD). This phenomenon is[...]

View More
What are APT’s?

What is an APT? APT stands for Advanced Persistent Threat. The goal of this form[...]

View More
Say What?

Recently I attended the IBM Security Systems Analyst Meet the Experts day in Heathrow. With[...]

View More
Security: the oft-forgotten dimension

Computer security is a hot topic today, and much talked about. There are endless emanations[...]

View More
Computer Security: Knowing What You Don’t Know

100 per cent security is a fantasy: you will be attacked by both known and[...]

View More
The State of Network Infrastructure

By Tony Lock Networks are the glue that allow users to function effectively in their[...]

View More
The Death of the Corporate Network Perimeter

By Tony Lock In a recent survey over 400 respondents gave us the inside track[...]

View More
Juggling Performance, Availability and Security

By Tony Lock A recent report from Freeform Dynamics illustrates that many corporate networks are[...]

View More
Controlling Application Access

Application performance, availability and security challenges are quietly creeping up in the context of internal[...]

View More
The Security Education Dilemma

By Charles Brett Security covers many dimensions, including the physical and logical. As such many[...]

View More
Are we barking up the wrong mobile data protection tree?

By Charles Brett Professional IT prefers disciplined approaches which back up, or copy, all enterprise[...]

View More
Software Defined Networking (SDN) continues to move forwards

By Charles Brett and Tony Lock During an Analyst Briefing at the IBM Development Laboratory[...]

View More
The Business Value of Data Protection

By Tony Lock The data held in every business is valuable and in the current[...]

View More
Device Proliferation and Data Fragmentation

By Tony Lock Bring your own device (BYOD) continues to attract considerable attention, but the[...]

View More
Data fragmentation challenges for CIOs

By Tony Lock A recent survey by Freeform Dynamics confirmed that access to accurate information[...]

View More
The End User Security Jigsaw

Organisations of all sizes are trying to understand the security implications of mobile working, device[...]

View More
The Data Protection Imperative

In this short paper, we spell out why the time has come to adopt a[...]

View More
Data Protection as a Business Enabler

While the importance of business information is almost universally recognised, few organisations have enjoyed either[...]

View More
Storage Anywhere and Everywhere

With more departmental applications, collaboration and sharing environments, and even cloud-based services, with access via[...]

View More
Managing expanding business – Critical Linux workloads

Evidence from users in the real world shows that for large workloads, the mainframe offers[...]

View More
DCIM and Energy Management

By Tony Lock Over several decades IT management has focussed almost exclusively on keeping servers[...]

View More
Workload placement in a hybrid world

Research shows that you are going to mix your platforms and deployment models in the[...]

View More
Security, privacy and data protection

By Tony Lock Many businesses today are faced with the challenge of rapidly fluctuating operating[...]

View More
Your local Public Cloud

By Andrew Buss A few weeks back we looked at the role that private and[...]

View More
Freedom without Anarchy

Empowering employees through the delegation of authority and trust can enhance innovation and productivity. But[...]

View More
Analytics and Big Data

By Tony Lock ‘Big Data’ is a hot topic receiving considerable attention from the marketing[...]

View More
Why you need an interactive archive

Many organisations today only archive data when there is some external legislative driver forcing their[...]

View More
Big Data and Analytics

Results of a web survey illustrate the state of business information and analytics today. Just[...]

View More
A more intelligent approach to security

At the RSA Conference 2012 in London, one of the key themes to emerge was[...]

View More
Datacentre in a box – Something for everyone?

CIOs have a tough job delivering an expanding range of services to ever more demanding[...]

View More
The Big Data Revolution

Big Data suffers misuse but at its heart is really about getting more value from[...]

View More
What should CIOs be demanding of Storage Vendors?

In most organisations the acquisition of storage and its associated management tools was, until recently,[...]

View More
Personal Use of a Windows Tablet in Business – It’s ready for operational use

There is no doubt that “Tablet” devices and “Slates” are attracting a lot of attention[...]

View More
Agility without anxiety

Dale Vile met up with Perforce’s Mark Warren to discuss how to do agile development[...]

View More
The Rise of User Centric IT – Is the consumerisation of IT a benefit to anyone?

There is a long history of end users wanting, or ‘needing’, to have ‘different’ tools[...]

View More
Balancing storage efficiency and data security

We know from our many studies that most IT organisations are stretched operationally while having[...]

View More
Siloed approach to IT security increases business risk

It is said that the technology at the heart of IT changes at a bewildering[...]

View More
Playing the SLA long game

By Dale Vile When IT is your day job it’s easy to lose sight of[...]

View More
Private Cloud Forecast – Sunny or Stormy times ahead for CIOs?

Businesses are still operating under enormous economic pressure and, as would be expected, this continues[...]

View More
Analyst Headlines: Securing the Data Center

Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]

View More
Behind the Headlines: Securing the Data Center

Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]

View More
Analyst Headlines: Securing the Access

Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]

View More
Behind the Headlines: Securing the Access

Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]

View More
Analyst Headlines: Securing the Wide Area

Andrew Buss discusses how security needs to become embedded and automated within the network and[...]

View More
Behind the Headlines: Securing the Wide Area

Andrew Buss discusses how security needs to become embedded and automated within the network and[...]

View More
BPM from back office to front office and beyond

Are you tough enough to take on BPM and win? Someone has to. It has[...]

View More
Energy Aware Planning and Decision Making

Energy availability and management is increasingly becoming an important agenda item for IT leaders, but[...]

View More
Seven enablers of effective disaster recovery for SMEs

By Tony Lock In a nutshell: Recent research carried out by Freeform Dynamics identified seven[...]

View More
Key points to highlight when selling storage

Organisations of all shapes and sizes are struggling to deal with the rapid growth of[...]

View More
Fast Forward to Big Data

Does ’cloud’ have a roll in providing customers with access to new data sources to[...]

View More
The great DR divide

Business continuity solutions only for large organisations? IT vendors and consulting firms who sell disaster[...]

View More
User Virtualization – Moving beyond device-centric computing

When business IT was young and channel partners had plenty of hardware margins to play[...]

View More
Winners and losers in the information race

The mainstream media generally portrays the financial services industry as being in a total mess,[...]

View More
The secrets of effective disaster recovery

There’s no magic bullet, but there’s a formula Many IT and business executives groan when[...]

View More
Closing the SMB security gap

It’s got the point where the majority of small and medium businesses (SMBs) take the[...]

View More
Data retention, FOI and the storage budget

The data retention policy in too many organisations has historically boiled down to ‘keep everything[...]

View More
The storage boom and bust cycle

More data more often than not means more disks. It was ever thus – but[...]

View More
The consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready

If media headlines and vendor claims are to be believed, organisations today are faced with[...]

View More
Enabling Rapid and Effective IT Recovery

IT vendors have traditionally targeted the lucrative large enterprise market with their data protection and[...]

View More
Disaster Recovery in European SMBs

By Tony Lock, Martha Bennett and Dale Vile KEY POINTS The term ‘disaster recovery’ is[...]

View More
The Consumerisation of IT (Slides)

Audience – IT & Business professionals Occasion – VMUG Meeting, Leeds, October 2011 Presenter(s) –[...]

View More
The SME security challenge

Over the years, research findings have consistently demonstrated widespread exposure to risk when it comes[...]

View More
Time to get serious about managing security

Do you know what’s running in your network? In this time of ever increasing security[...]

View More
Compliance: The legal landscape and how to navigate it

Every IT professional recognises the im­portance of securing the IT systems on which critical business[...]

View More
The evolution of desktop security

The operating habits of users render passwords as the primary mechanism to secure any application[...]

View More
The workload challenge

Today, IT Infrastructure is evolving at a tremendous pace. The Mainframe computer, now often referred[...]

View More
RSA hack demonstrates need for proactive security and multi-layer protection

The recent news that RSA Security suffered a security attack and breach that resulted in[...]

View More
Trust and security in the cloud

By Andrew Buss & Dale Vile KEY FINDINGS Many companies could do much better when[...]

View More
The realities of SaaS and Security

With upgrades to Windows 7 and Office 2010 high on the agenda, questions are being[...]

View More
SaaS suppliers are no black box, evaluation is key

An aspect of cloud computing that is often overlooked is supplier evaluation and management. We[...]

View More
SaaS security: it comes down to knowing what you are doing

A lot of things have happened recently that may cause us to think twice about[...]

View More
SaaS providers – The good, the bad and the ugly

Interested in software as a service (SaaS) but worried about the risks to your information?[...]

View More
Buying into the cloud

A lot of companies are reporting that individual departments and even business users are adopting[...]

View More
Software as a service can breed dependency so choose suppliers with care

Cloud computing is frequently likened to utility services such as electricity, water or gas. If[...]

View More
The weakest link in Software as a Service

The delivery of cloud based application functionality via the Software as a Service (SaaS) model[...]

View More
Secure your departmental apps

Throughout a workshop on The Register, we’ve been looking at resiliency and security for hosted[...]

View More
What you think about SaaS

Throughout a workshop conducted on The Register, we have been looking at the factors that[...]

View More
Whose data is it anyway?

Losing control of one’s data is among the first concerns that arise when software as[...]

View More
Putting the SaaS into security management

In all areas of business, security and privacy are built on good policy, properly applied.[...]

View More
Is cloud data secure?

Would your data be more secure in the hands of Google or left where it[...]

View More
A question of performance

Software as a service (SaaS) promises a lot but many are still nervous about relying[...]

View More
Trust and risk in the cloud

Stick enough kit and multi-tenant software in one huge data centre and there is no[...]

View More
What is the point of End Point Protection?

How we should be protecting our PCs Security threats have existed for almost as long[...]

View More
The alternatives to password protection

In a world where it is possible to create credential-stealing malware and where users are[...]

View More
The perception and reality of cloud security

Some back to front thinking in evidence? One of the most frequent concerns about cloud[...]

View More
Modern solutions to an ever-growing challenge

What could be new about backup and recovery? After all, everyone has been doing it[...]

View More
Disaster recovery blurs into high availability (or other way round?)

IT managers use two terms when talking about systems availability. These are: High Availability or[...]

View More
Shaping your next desktop upgrade

The economic downturn caused many companies to delay their desktop and notebook refresh plans, but[...]

View More
The industrialisation of the IT Threat Landscape

Business and IT are now changing with a rapidity never before seen while at the[...]

View More
CIOs and ’Data Protection’

By Tony Lock The rapid growth in the amount of stored data means that the[...]

View More
Data encryption adoption represents a significant opportunity

By Andrew Buss Data protection continues to be a top of mind subject for many[...]

View More
Keys to data encryption adoption

Data protection remains top-of-mind for many companies. Data losses continue across both public and private[...]

View More
The threat and promise of server virtualisation security

Given that IT security is all about understanding, and mitigating risks, it is inevitably going[...]

View More
Moving beyond user rights – Protecting data first

It goes without saying that IT systems should, in principle, be secured so that only[...]

View More
Is there a case for encrypting backups?

For most organisations, backups form an essential part of the day to day activities of[...]

View More
Managing IT and business risk in the times of eroding enterprise boundaries

Managing risk in business has always been more of an art form than a science.[...]

View More
Solvency II: Threat or Opportunity?

By Dale Vile and Jon Collins INTRODUCTION The emergence of new regulation always presents a[...]

View More
Collaboration, complexity and compliance

The trouble with some terms we use in IT is that they take on a[...]

View More
Who cares about encryption?

We’re used to getting a hundred or so responses from the mini-polls we run, but[...]

View More
The terror beyond the firewall

“The office” is fast becoming, for many organisations, a thing of the past – at[...]

View More
Doing the right thing on ID management isn’t enough. It’s proving that you did it

In a previous article we looked at Identity Management and access provisioning as an end[...]

View More
Those demanding mobile users

For years, when we asked Reg readers what worried them about mobile, “security” was top[...]

View More
The cloud’s impact on security?

We tried to get through this workshop without using the five letter C-word, but we[...]

View More
Mobile technology and security

By Josie Sephton In a nutshell: The issue of security when thinking about flexible working[...]

View More
Threat or opportunity?

By Martin Atherton In a nutshell: When it comes to data protection and information security[...]

View More
Driving With the Brakes On

By Jon Collins In a nutshell: While much attention around information risk is on medium[...]

View More
Security – policies, processes and people

The problem with building foolproof systems, so the saying goes, is that the world seems[...]

View More
Does business really care about security?

I once read a book that said, among other things, “You can never truly give[...]

View More
Delivering on data governance – Making sure IT’s glass is half full

Data governance can be dismissed as ‘applied common sense’, or balked at as an impossible[...]

View More
Should we be encrypting backups?

We all know that data protection regulations are gaining teeth. As we discussed before, it[...]

View More
Is it possible to measure IT Security?

It is a commonly held principle in many areas of business that if you can’t[...]

View More
Delivering a secure information infrastructure

I recently had the task of writing an explanatory paper about Good Practice Guide (GPG)[...]

View More
Protective Monitoring

by Jon Collins and Martin Atherton MAIN POINTS CESG (Communications and Electronic Security Group) Good[...]

View More
The impact of virtualisation on securing systems

Virtualisation has become an established trend in the x86 server market and is moving into[...]

View More
Using systems management tools in IT security

Every IT professional recognises the importance of securing the IT systems that are now at[...]

View More
The evolving role of the IT security manager

Security has long been the poor cousin of IT. As any security professional knows, the[...]

View More
Securing Your Network

In this three part podcast Jason Stamper, editor at CBR, talks to Jon Collins and[...]

View More
Data security strategies and drivers

Audience – Sales and pre-sales audience selling to large enterprises and government Occasion – Annual[...]

View More
Security: Get the board on board

While the principles of IT security are relatively timeless and straightforward to understand, technology itself[...]

View More
Rethinking security. Just what are you trying to secure?

Ask any IT manager, business leader or regulator and they will tell you that IT[...]

View More
Application Retirement: What about the Data?

by Jon Collins and Martin Atherton Introducing application retirement: what’s really important to you? Whatever[...]

View More
Should all hard drives be encrypted?

Given the origins of computing in the coding and decoding of messages, it’s fair to[...]

View More
Securing the Un-securable?

Audience – IT security practitioners and academics Occasion – BCS Information Security Special Interest Group[...]

View More
Dedication to regulation

By Martin Atherton Regulation is a fact of life and business. The signs are that[...]

View More
Virtualisation and Security

As x86 / x64 server virtualisation moves into everyday operations, what impact does it have[...]

View More
Data protection and identity management – are you sure you’re safe?

Data protection is an essential area for businesses, and an increasingly critical one to deal[...]

View More
Is your data safe – and accessible?

Data protection has been a requirement and an obligation for organisations of all sizes since[...]

View More
Threat predictions for 2010

Jon Collins and Paul Wood of MessageLabs give their predictions for the coming year on[...]

View More
How bad are the bad guys?

By Jon Collins The Internet has come a long way since its rudimentary beginnings as[...]

View More
Looking at the threat landscape – It’s getting scary out there….

Jon Collins and MessageLabs’ Paul Wood examine some of the current threats we all face,[...]

View More
Delivering on identity and access management

By Jon Collins At a recent panel event involving senior security managers and chief information[...]

View More
Making IT Work In The Real World

Most organisations run a mix of systems in their IT infrastructure. One of the challenges[...]

View More
IT security and Governance

By Jon Collins It has sometimes been said that in Information Technology, the emphasis has[...]

View More
Data Retention

by Jon Collins and Martin Atherton Earlier last year we conducted some research on the[...]

View More
Resiliency in the Real World

by Tony Lock A recent report by Freeform Dynamics shows that IT systems fail. What‟s[...]

View More
The Impact of IT Security Attitudes

by Jon Collins Much has been written about the existence of various threats, internal and[...]

View More
Email resiliency and the SMB

by Martin Atherton For most businesses, IT is linked to multiple facets of activity: product[...]

View More
Secure USB

by Jon Collins When the USB standard was first launched, few would have imagined the[...]

View More
Risk and Resilience

The application availability gamble The modern business is highly dependent on IT. When systems go[...]

View More
What governance can really mean to business

by Martin Atherton Governance is a term you’ll have heard bandied about a lot, usually[...]

View More
Data Governance in the Software Lifecycle

by Martin Atherton, Jon Collins and Dale Vile Many organisations have been driving improvements in[...]

View More
Data Governance in Software Testing

by Jon Collins In the research report Data Governance in the Software Lifecycle we consider[...]

View More
Information Governance

by Martin Atherton and Jon Collins Forward thinking organisations no longer just talk about governance,[...]

View More
Security no longer just about hackers

by Jon Collins I went to a fascinating panel session a couple of weeks ago,[...]

View More
Managing Access Securely

Authentication that works for the evolving organisation

View More