Magazine Button


The real cost of fighting the insider threat

Detecting an insider threat can prove one of the biggest challenges within the cybersecurity realm. Adenike Cosgrove, Cybersecurity Strategy, International at Proofpoint, explores the impact of an insider threat across an organisation and how to avoid being left with a hefty bill. Insider threats are on the rise: up 47% year-on-year, in fact. And organisations […]

Five steps to successful and confident cloud migration, even in a pandemic

Due to the current circumstances, businesses are being forced to migrate workloads to the cloud. Geoff Barlow, Cloud Architect at Node4, offers several ways a company can build confidence in their cloud migration project. Recent events have caused a huge upheaval for many businesses as they face the need to maintain business operations amidst the […]

How can businesses bolster cyberdefences in light of Coronavirus?

As the shift to 100% remote working during the COVID-19 crisis increases the likelihood of a cyber breach, experts reveal how businesses can improve their cyber defences to prepare and protect. Amit Serper, Vice President of Security Strategy and Principal Researcher at Cybereason: “In every corner of the world, COVID-19 has had an impact. During […]

Security in a multi-cloud environment

Paul Nicholson, Director of Product Marketing, A10 Networks, discusses why businesses are initially implementing multi-cloud environments, not to mention how they can accidentally find themselves in a complex multi-cloud set up if Digital Transformation happens on an ad-hoc basis. Nicholson highlights the importance of including security into a multi-cloud strategy, with so many factors potentially […]

Avoiding an existential crisis, CIOs need to reinvent themselves

As the CIO role transforms, CIOs have no option but to adapt within their role and conform to their new-found requirements. Erich Gerber, SVP EMEA & APJ at TIBCO, identifies some of the traits needed by this decade’s information chiefs. The CIO role has transformed massively over the years and now it’s set to do […]

Why CIOs and CFOs should be the ‘Druckers’ of their organisations

Organisations are faced with many challenges in the digital age. Gary O’Brien, Principal Consultant and Organisational Designer, ThoughtWorks, explains how they need to evolve how they plan to be able to adopt new and emerging technologies. Peter Drucker’s key ideas and predictions have largely stood the test of time and formed the foundation for how […]

How to manage network risk using fluid security

With organisations utilising new technologies in the age of Digital Transformation, it is vital that the security surrounding innovation is up to standard. Amrit Williams, Vice President of Products at Skybox Security, tells us why fluid security practices are so important in developing a successful security programme and thus relieving pressure for CISOs. As organisations […]

Goodbye, on-premises infrastructure – hello, private cloud

Cloud offers many benefits in an age where data dominates. Jon Lucas, Co-Director at Hyve Managed Hosting, investigates the underlying challenges for on-premises infrastructure users and how private cloud can bypass these by offering a superior solution. We are currently seeing a movement away from on-premises infrastructure, which has no doubt been propelled by the […]

Experts discuss how enterprises can better manage their data to prevent fraud

RSA Security has announced its Adaptive Authentication for eCommerce capability which improves fraud protection and user experience. RSA Security, a global cybersecurity leader delivering business-driven security solutions to help organisations manage digital risk, has announced the general availability of RSA Adaptive Authentication for eCommerce version 20.5. In this version, RSA Adaptive Authentication for eCommerce implements […]

Huawei predicts 10 emerging trends in telecom energy in next five years

Huawei releases 10 emerging trends in telecom energy in 2025, aiming to provide a reference for operators on site infrastructure construction. 5G is coming. Telecom networks need to undergo these three significant changes: introduce new spectrums and technologies, a lot of new sites and mobile Edge Computing (MEC) sinking. At the same time, as 5G […]

Expert discussion: What best practice approach should businesses take to password security?

Password protection is a critical component of a strong business cybersecurity strategy. Kevin Curran, Senior Member of the IEEE and Professor of Cybersecurity at Ulster University, says that the number one rule for companies to manage passwords securely is for their employees to use different passwords across all sites. However, in doing this, individuals often […]

The new data decade’s other disruption

Chris Greenwood, Head of UK&I at NetApp, offers an insight into how new technologies might disrupt what data looks like from an organisation’s perspective – and how this knowledge could potentially help CIOs begin preparing for the future. As we move into a new decade, with cloud computing continuing its shift from being a new […]

Browse our latest issue

Magazine Cover

View Magazine Archive