As operational and information technologies increasingly intertwine, CIOs must ensure they lead their organisations' digital transformations

Half of cloud users cite lack of in-house skills as a reason for adoption

Recommending passwords be changed post breach is becoming common practice. But is it good practice?

Businesses are not equipping themselves to deal with Advanced Evasion Techniques, instead choosing to hide behind traditional firewalls

Is the data centre prepared for the amount of data and traffic that smart cities will generate?

Businesses are failing to get to grips with the PCI DSS 3.0 standard with only 10% of organisations currently compliant, according to ...

The growing importance of the cloud access security market shows that SaaS adoption is coming to the fore of the boardroom agenda

In the case of a reorganisation, merger, or acquisition, companies need to tread carefully and put security near the top of the agenda from the...

In the era of ultra-flexible collaborative working, have static, room-based telepresence solutions had their day? Information Age...

In a post-Snowden world where people are already distrustful of government snooping, the manner of David Cameron’s emergency phone and internet...

Pages