Securing a virtual network differs from traditional security in a number of ways, and there are many misconceptions that need to be put to rest ...

Giving cloud end-users the flexibility to apply their own encryption solves many of the problems around privacy, but there are lots of factors for...

New technology scans the users finger veins, rather than finger prints, to increase security

It's time to stop obsessing over big exciting numbers and get serious about the practicalities of making the connected world work

The coming years will decide which technology will gain supremacy in the current battle for users’ desktops - but it may not be advisable to pick...

What more could be done to encourage digital and tech companies to flourish? Sarah Willis writes

Millennials are increasingly taking over digital marketing roles, and their natural ease with the online world makes them the ideal addition to...

Andrew Butler, VP and distinguished analyst at Gartner, examines the pros and cons of a multiple-vendor approach in IT Infrastructure and...

As the gender imbalance in IT drags on, Salesforce.com’s Area VP of commercial sales, Eileen O'Mara, rallies for change

Mobile commerce is about to take the world by storm, but many different elements will have to come together for cashless mobile payments to work...

Pages