Initiatives such as click and collect and seamless integration of retailers’ in-store and online systems are transforming high street shops into...

IBM Watson’s Personality Insights provides enjoyable distractions, but similar technologies can deliver business value to organisations with...

BYOD has been around for nearly a decade, so it's time we looked beyond the conventional security approaches and broke the problem down

It’s vital to plan and develop some key focus areas around business risk when implementing an IT security strategy

Seven tips to ensure your mobile app is not one of the 80% that are deleted after just one use

How businesses can improve their return on their investments in legacy mainframe systems

As we have seen time and again in this and previous years, a siloed and inward looking approach to cyber security cannot, and does not, work

It’s business versus the digital enterprise: what are the expert tactics for taming the beast? We need to be able to predict its next move.

Will the government's recent commitment to apprenticeships tackle the technical skills shortage in the UK?

How well protected are you in today's cyber threat landscape? New legislation mandating companies publically disclose data breaches has caused all...

Pages