Logo Header Menu

Topics

Information Age Topics – AI and Machine Learning, Automation, Blockchain, Cloud and Edge Computing, Communications and Networking, Cybersecurity, Data Storage and Data Lakes, Data Privacy, Digital Transformation, Emerging Technology, Immersive Technology, IoT and M2M, Robotics, Outsourcing, Smart Cities, Software and Applications, Start-up Scene, Tech Giants.

divider
How technology’s influence will impact businesses in the year ahead

How technology’s influence will impact businesses in the year ahead

divider
How to make cyber security intelligence-driven and proactive

How to make cyber security intelligence-driven and proactive

divider
Cybersecurity
The importance of Strong Customer Authentication as PSD2 deadline approaches

The importance of Strong Customer Authentication as PSD2 deadline approaches

17 February 2020 / The deadline for implementation of PSD2‘s Strong Customer Authentication (SCA) for online banking is just [...]

divider
Business & Strategy
Why disaster recovery-as-a-service is the industry’s next vital tool

Why disaster recovery-as-a-service is the industry’s next vital tool

14 February 2020 / Disaster recovery-as-a-service is the industry’s next vital tool. Recent studies have estimated that in 2019, [...]

divider
Cybersecurity
Election hacking: is it the end of democracy as we know it?

Election hacking: is it the end of democracy as we know it?

14 February 2020 / Since the 2016 US election, there have been murmurs about hacking elections. There are reports [...]

divider
Business & Strategy
Just 32% of data teams can extract insights for better decision-making

Just 32% of data teams can extract insights for better decision-making

13 February 2020 / New research commissioned by the analytics database company, Exasol, has found that only 32% of [...]

divider
Cybersecurity
Real-time data and cyber security: key to mitigating the risk

Real-time data and cyber security: key to mitigating the risk

13 February 2020 / Many of the discussions surrounding cyber security mention how it must be more of a [...]

divider
Cybersecurity
Top UK cyber insurance providers

Top UK cyber insurance providers

13 February 2020 / Cyber insurance is an emerging market that’s starting to thrive in the UK. However, it’s [...]

divider
Cybersecurity
The evolution of the hacker: what businesses needs to know

The evolution of the hacker: what businesses needs to know

13 February 2020 / In order to beat your enemy, you must know your enemy, according to Sun Tzu’s [...]

divider
IoT and M2M
Why enabling purpose-driven ecosystems is key for CIOs leveraging IoT

Why enabling purpose-driven ecosystems is key for CIOs leveraging IoT

12 February 2020 / As we start this new decade and reflect on what was, it is apparent that [...]

divider
Cybersecurity
What to know about open source security

What to know about open source security

12 February 2020 / Like any area of tech, open source needs its own security measures to thrive without [...]

divider
Cybersecurity
Spearheading the defence against a cyber attack requires c-suite buy-in

Spearheading the defence against a cyber attack requires c-suite buy-in

12 February 2020 / Cyber security and data security risks have climbed to the top of UK plcs’ boardroom [...]

divider
Cybersecurity
What are the newest cyber attacks to look out for?

What are the newest cyber attacks to look out for?

11 February 2020 / Cyber security teams have to stay on the front foot, in order to protect company [...]

divider
Business Skills
Addressing the cyber skills shortage by nurturing talent

Addressing the cyber skills shortage by nurturing talent

11 February 2020 / A quick look at the figures shows why the cyber skills shortage is so bad [...]

divider
Business Continuity
Businesses forced to add data-loss cover on top of traditional buildings insurance

Businesses forced to add data-loss cover on top of traditional buildings insurance

10 February 2020 / Businesses are being forced to add additional IT buildings insurance to protect themselves against data [...]

divider
Cybersecurity
How to keep critical data safe from third-party risks

How to keep critical data safe from third-party risks

10 February 2020 / Data is the foundation of many organisations and effective data management is often essential for [...]

divider
Cybersecurity
How to choose a cyber insurance policy

How to choose a cyber insurance policy

10 February 2020 / Cyber insurance is a relatively new area that’s hard to navigate. A standard policy is [...]

divider
Business & Strategy
How to gain total asset visibility within your enterprise

How to gain total asset visibility within your enterprise

7 February 2020 / The benefits of deep visibility are evident. Total asset visibility will: • Reduce waste by [...]

divider
Cybersecurity
Nation states won’t bother with backdoors—instead they’ll walk in the front

Nation states won’t bother with backdoors—instead they’ll walk in the front

7 February 2020 / The move to limit Huawei to “non core” parts of critical infrastructure signals the UK’s [...]

divider
Business & Strategy
Is your CISO stressed? According to Nominet, they are

Is your CISO stressed? According to Nominet, they are

6 February 2020 / Nominet’s CISO Stress report looks at the impact of continued stress on the mental health [...]

divider
Cybersecurity
Adversarial artificial intelligence: winning the cyber security battle

Adversarial artificial intelligence: winning the cyber security battle

6 February 2020 / Artificial intelligence (AI) has come a long way since its humble beginnings. Once thought to [...]

divider
Cybersecurity
Tackling the cyber security challenges of the cloud to maximise its potential

Tackling the cyber security challenges of the cloud to maximise its potential

5 February 2020 / Cloud computing has become a prevalent force, bringing economies of scale and breakthrough technological advances [...]

divider
Cybersecurity
The state of the cyber security market, according to BlackBerry’s CTO

The state of the cyber security market, according to BlackBerry’s CTO

5 February 2020 / “The largest cyber security strategy being deployed in the cyber security market is hope, ‘hope [...]

divider
Automation
7 key RPA trends for 2020: from AI enabler to more strategic scaling

7 key RPA trends for 2020: from AI enabler to more strategic scaling

4 February 2020 / What are the key RPA trends for 2020? 1. Greater RPA vendor differentiation insights will [...]

divider
Cybersecurity
Microsoft Teams experiences outage due to outdated certificate

Microsoft Teams experiences outage due to outdated certificate

4 February 2020 / Users of Microsoft Teams went without the program for almost three hours before Microsoft eventually [...]

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest