Patching up holes in the IT security blanket

Global tech firms are snapping up hot London start-ups to fuel its demand for top software engineers

Many organisations fail to ensure that access to corporate data is terminated along with employee contracts

Large enterprises can use honeypots as a means to detect and monitor any attempts at illegitimate access to sensitive data and including some...

As a global force for both fashion and technology, the capital has become a hotbed of wearable innovation

Data protection and recovery planning can be a complex process, but it doesn't have to be if a few basic principles are followed

With no shortage of DDoS attacks overwhelming the news headlines, many businesses have been fast to question whether they are well protected by...

It might sound like a bad movie, but it’s playing out in real life – despite what seems like endless cyber-attacks using SQL injection, SQLi...

The measures that Apple must put in place in order to maintain consumer confidence in its new platform

By shunning custom hardware platforms, the likes of Amazon, Facebook and Google have been able to build massively scalable IT platforms

Pages