Expert opinion – is SIP trunking the weak link in your armour?

By Paul Clarke, UK Manager, 3CX The advent of IP telephony has not only reduced costs for companies but also enabled the adoption of flexible working conditions – both in terms of working hours and working location. Unified communications systems that take advantage of IP connections can provide a plethora of business benefits – but, […]

Six key data strategy considerations for a cloud-native transformation

Many organisations are making the move to cloud-native platforms as their strategy for digital transformation. Cloud-native allows companies to deliver fast-responding, user-friendly applications with greater agility. However, the architecture of the data in support of cloud-native transformation is often ignored in the hope that it will take care of itself. With data becoming the information […]

Warning: ‘Traffic systems at risk of cyberattack’

Industry experts have responded to comments made about cybersecurity risks posed to the UK’s critical infrastructure. Speaking with the BBC Today programme, and reported by the Daily Telegraph, General Sir Christopher Deverell, Commander of the UK’s Joint Forces Command, warned that traffic control systems were at risk of cyberattack, with road systems one of several […]

Survey reveals five keys to secure DevOps, cloud and IoT adoption

BeyondTrust, a leading cybersecurity company dedicated to preventing privilege misuse and stopping unauthorised access, has announced the results of the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology survey. The survey shows that 90% of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI. Yet, […]

Mobility and security in the age of free public Wi-Fi

Article by: Mato Petrusic, Head of EMEA at iPass Mobile working is increasingly becoming the norm for many enterprises, with Strategy Analytics predicting that there will be 1.75 billion mobile workers by 2020. At the same time, mobile security threats are on the rise: according to the McAfee Mobile Threat Report Q1 2018, 16 million […]

World Cup scams: how to avoid an own goal

Tomas Foltyn, Security Writer at ESET, says that, whether travelling to enjoy the matches in person, or watching from home, fans should be on the lookout for foul play when it comes to the FIFA World Cup. Have you been looking forward to the 2018 FIFA World Cup? So have scammers and they’re kicking it […]

The Orkney Islands just became one of the most exciting places in tech

Article by: Cindy Rose, Chief Executive of Microsoft UK It is easy to take technology for granted. People can work from anywhere, collaborate like never before and share ideas in new and exciting ways. An entire generation is growing up with the world literally at their fingertips; every piece of information ever discovered is just […]

GDPR: What is the impact around the globe?

Article by: Marianne Calder, VP & MD EMEA, Puppet The countdown to the official implementation of the GDPR is now over. It took a while to get the message of its importance across but by now most, if not all, organisations are creating policies to maintain compliance and avoid the fines looming over those who […]

BeyondTrust introduces new ways to manage access policy efficiently

BeyondTrust, a leading cybersecurity company dedicated to preventing privilege misuse and stopping unauthorised access, has announced two new features in PowerBroker for Windows that help IT administrators manage privileged access by automating their security policies. With an increase in stolen credentials as the cause of many of today’s data breaches and hacking attacks, according to […]

It’s time to get NIS directive compliant, expert says

Simon Edwards, Cybersecurity Solution Architect at Trend Micro, discusses the EU compliance law which he says is just as important to long-term security, stability and growth as the headline dominating GDPR.  Critical national infrastructure (CNI) is an essential pre-requisite for any functioning society. It provides us with energy, transportation, water, hospitals and vital internet services. […]