The top five things we’ve learned since Windows XP’s ‘end of life’

Article by: Mat Clothier, CEO, CTO and Founder at Cloudhouse It has been four years since Windows XP reached its ‘end of life’ back in April 2014. The end of life (EOL) of an operating system marks the point after which security updates and patches will no longer be provided; although the systems still run […]

Using data to enhance your enterprise cyber hygiene

Jim Doggett, US VP and CISO, Panaseer In the good ‘ol days of CISO, things were straightforward and it was pretty easy to do what it took to be successful. I would prepare a budget for the upcoming year from a list of essential and value-added projects, which my security and risk team supported. Then […]

The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including: multi-factor authentication (MFA), standards-based solutions, biometrics and smartphone-based authentication – to name just a few. This change has been driven […]

How security solutions are utilised to protect online data

Anthony Chadd, Senior Director, EMEA, Neustar Across both public and private sectors, nobody is immune to cybercrime. A main area of concern is the proliferation of DDoS attacks which, in a recent report by Accenture, were highlighted as responsible for a large proportion of the costliest and damaging cyberattacks on businesses in the UK alone. […]

The new role of the CIO: business transformation leader

Article by: Alvina Antar, CIO at Zuora Recent technological advancements in emerging technologies such as the Internet of Things (IoT), advanced data analytics and artificial intelligence (AI) have ushered in what many commentators are dubbing the Fourth Industrial revolution. In combination with the integration of millennials and generations X and Y into today’s workforce, this […]

Cloud technology is becoming more utilised in the workplace

By Angela Evans, Office Business Leader at Microsoft UK “In recent years, the cloud has undoubtedly established itself as a key cog in the enterprise IT wheel. With clear benefits in data storage, security and recovery, 96% of businesses have implemented cloud services to reap both short and long-term advantages. As the technology has embedded […]

Incident response: a six-step guide

Tim Bandos, Senior Director of Cybersecurity at Digital Guardian, discusses how good incident response always starts with answering six key questions. Incident response is defined as the process by which an organisation handles a data breach or cyberattack. The goal of incident response is to efficiently manage an incident so that the damage is limited […]

Veeam expert: 2018 is the year of the ‘always-on cloud’

Paul Mattes, VP of Global Cloud Group, Veeam, informed us of how availability has become key to the efficiency of cloud computing. He said enterprises that are let down by a lack of cloud availability will find it easy to switch to a competitor. Cloud computing was really born just over 10 years ago, after […]

Effects of 5G on millennials and the workplace

Article by: Curtis Peterson, SVP Cloud Operations, RingCentral Evaluating a millennial’s potential in the workforce can’t help but start with a few preconceived notions. Millennial’s are perceived as disloyal, changing jobs at an average rate of every 2 years. They support marijuana legalisation at higher rates than any other generation. And finally, they don’t like […]

Securing blockchain with privileged access management

Article by: Morey Haber, Vice President of Technology, Office of the CTO, BeyondTrust The level of hype around bitcoin, blockchain and cryptocurrency is absolutely amazing. When you hear an Uber driver talking about it, or your local news carries a piece on how a family paid for their daughter’s wedding with bitcoin, then you know […]