Patching up holes in the IT security blanket
Global tech firms are snapping up hot London start-ups to fuel its demand for top software engineers
Many organisations fail to ensure that access to corporate data is terminated along with employee contracts
Large enterprises can use honeypots as a means to detect and monitor any attempts at illegitimate access to sensitive data and including some...
As a global force for both fashion and technology, the capital has become a hotbed of wearable innovation
Data protection and recovery planning can be a complex process, but it doesn't have to be if a few basic principles are followed
With no shortage of DDoS attacks overwhelming the news headlines, many businesses have been fast to question whether they are well protected by...
It might sound like a bad movie, but it’s playing out in real life – despite what seems like endless cyber-attacks using SQL injection, SQLi...
The measures that Apple must put in place in order to maintain consumer confidence in its new platform
By shunning custom hardware platforms, the likes of Amazon, Facebook and Google have been able to build massively scalable IT platforms