Digital

Strong data skills to support transformation: why the newest normal needs to integrate shifting priorities

Strong data skills to support transformation: why the newest normal needs to integrate shifting priorities

Richard Timperlake, Vice President, EMEA at Alteryx From decimated semiconductor supply chains, to shortages of skilled and unskilled ..

The role of smart technology in delivering ethical physical security

The role of smart technology in delivering ethical physical security

By: Sam Lancia, Head of Video Engineering & Co-Founder of Ava Security The physical security sector is full of words that could se..

From hero to villain and loyal sidekick of the cybercriminal

From hero to villain and loyal sidekick of the cybercriminal

By Lotem Finkelsteen, Head of Threat Intelligence at Check Point Research (CPR) A good thing in the wrong hands can cause enormous dam..

How to adopt a robust domain name security strategy

How to adopt a robust domain name security strategy

Gareth Jehu, CTO at Com Laude At the start of the pandemic, Zoom suffered a setback when hackers crashed meetings by ‘Zoombombing’. Fa..

Over half of Brits believe technology can create a kinder society

Over half of Brits believe technology can create a kinder society

52% of people believe technology will be a pivotal solution for promoting and employing kindness in their city 82% of UK citizens bel..

The Hybrid Workplace at Risk: Brits Are More Concerned about Internet Security than Ever Before, Yet Nearly Half are Unaware of Mobile Phishing Threats

The Hybrid Workplace at Risk: Brits Are More Concerned about Internet Security than Ever Before, Yet Nearly Half are Unaware of Mobile Phishing Threats

New Unisys Security Index™ finds almost half of Brits are unaware of SMS phishing, and more than two-thirds don’t know where to..

Top 3 Cyber Security Concerns in Public Sector in 2021

Top 3 Cyber Security Concerns in Public Sector in 2021

By: Dominik Birgelen, CEO of oneclick AG Almost everyone can recall a time they were almost hacked or at least targeted for a breach. ..

Intel, Juniper Networks and Rakuten Symphony Introduce Next Generation of Distributed RAN and Transport Solution to Further Simplify O-RAN Deployments at Scale

Intel, Juniper Networks and Rakuten Symphony Introduce Next Generation of Distributed RAN and Transport Solution to Further Simplify O-RAN Deployments at Scale

Solution slashes total cost of ownership and fast tracks innovations in the radio access network Los Angeles, Intel, Juniper Networks ..

Cybersecurity experts discuss how you can be more cyber smart this Cybersecurity Awareness Month

Cybersecurity experts discuss how you can be more cyber smart this Cybersecurity Awareness Month

Being cyber smart, the theme of this year’s Cybersecurity Awareness Month, is not unachievable, but it certainly requires investment o..

The Future of Cloud: How to Keep Your Data Safe

The Future of Cloud: How to Keep Your Data Safe

By Pete Braithwaite, COO of KIT Online Cloud services are inherently scalable, responsive and flexible. They offer huge flexibility – ..

Firms Shouldn’t Let Their Cloud Vendor’s Platform Limit Their Operational Flexibility

Firms Shouldn’t Let Their Cloud Vendor’s Platform Limit Their Operational Flexibility

By: Mark Richman, Principal Product Manager, Cloud Platform, iManage Recently, the UK government unveiled plans to change data protect..

The Cloud Explained: Five Benefits of Cloud Migration

The Cloud Explained: Five Benefits of Cloud Migration

By: Sheena Prema- Cloud Proposition Design Manager at Six Degrees Cloud computing is seeing an inexorable rise, as organisations thro..

How to optimise cloud spend for success and flexibility

How to optimise cloud spend for success and flexibility

By: Servaas Verbiest, Lead Cloud Evangelist at Sungard Availability Services Cloud computing has underpinned the world’s remote workfo..

How AI Can Mitigate Phishing Attacks.

How AI Can Mitigate Phishing Attacks.

By: Nigel Seddon, VP of EMEA West, Ivanti Some irritations never seem to die. Elevator music, telemarketing calls, and, of course, phi..

How the latest smart cities technology is keeping the ‘last mile’ flowing

How the latest smart cities technology is keeping the ‘last mile’ flowing

By Guy Bloch, CEO at Bringg E-commerce has recently witnessed explosive growth, with the e-commerce logistics market incr..

Netacea Index Identifies Top Five Scalper Bot Targets: Graphics Cards, Sneakers Lead List

Netacea Index Identifies Top Five Scalper Bot Targets: Graphics Cards, Sneakers Lead List

New quarterly report reveals most in-demand goods bought for resale using automated bots Manchester, UK – September 2021 – Netacea, th..

2020 offered a perfect storm for cybercriminals and a critical tipping point for the cyber arms race

2020 offered a perfect storm for cybercriminals and a critical tipping point for the cyber arms race

By: Probrand Every year Probrand highlights how the cybersecurity threat is increasing, because protecting data and systems is a prior..

Zero Trust Architecture – no longer a ‘Nice to Have’

Zero Trust Architecture – no longer a ‘Nice to Have’

The US National Institute of Standards and Technology’s (NIST) recent Special Publication (SP 800-207) has changed the table stakes wh..

Accepting the challenge: deep learning’s ability to change the security landscape

Accepting the challenge: deep learning’s ability to change the security landscape

By Brooks Wallace, VP EMEA at Deep Instinct  As the cyber security industry grows and the cyber landscape changes, criminals are getti..

First-of-its-kind AI predicts tenants’ rent debt up to six months before it happens

First-of-its-kind AI predicts tenants’ rent debt up to six months before it happens

An innovative tech firm is using first-of-its-kind artificial intelligence (AI) to help housing associations predict when residents ar..

Cyber Criminals go after Users of Brazil’s #1 Banking Online Payment service: PIX

Cyber Criminals go after Users of Brazil’s #1 Banking Online Payment service: PIX

Check Point Research (CPR) discovers cyber attacks on users of PIX, the instant payment system managed by the Brazilian Central Bank. ..

Extreme Networks and Wireless Broadband Alliance Deliver Open Roaming Connectivity

Extreme Networks and Wireless Broadband Alliance Deliver Open Roaming Connectivity

Polytechnic Institute of Viseu (IPV) Campus to Benefit from Secure and Seamless Handoff  Between Wi-Fi and Cellular Networks Expanding..

DoubleVerify Partners with TikTok to Measure Viewability and Invalid Traffic

DoubleVerify Partners with TikTok to Measure Viewability and Invalid Traffic

DV helps global brands authenticate media quality on TikTok, bringing clarity and confidence to advertisers on the high growth platfor..

Emerging technology and skills: why targeted upskilling matters

Emerging technology and skills: why targeted upskilling matters

Janice Burns, Chief People Officer at Degreed, discusses why the right skills are vital to business recovery and offers tips to help b..

Data protection in the cloud-native future of finance

Data protection in the cloud-native future of finance

By Michael Cade, Senior Global Technologist, Veeam Cloud-native adoptions and the use of Kubernetes are on the rise. 451 Research note..

Kiviks Puts Cloud at the Core of Digital Transformation with Infor

Kiviks Puts Cloud at the Core of Digital Transformation with Infor

By: Phil Lewis is Vice President, Solution Consulting EMEA at Infor. Harvesting growth  Over the past ten years, boutique cider produc..

Reduce the threat of cyberattacks with NetOps and SecOps collaboration

Reduce the threat of cyberattacks with NetOps and SecOps collaboration

By: Paul Barrett, Chief Technology Officer, Enterprise, NETSCOUT Mass migration to the cloud and dependence on remote wor..

Making Sense of Cloud’s Complexities

Making Sense of Cloud’s Complexities

By Cathy Gadecki, Senior Director Data Centre, Juniper Networks Enterprise IT strategies have travelled a long way in the past decade...

Understanding the Privacy vs Security customer conundrum

Understanding the Privacy vs Security customer conundrum

By: Amir Nooriala, Chief Commercial Officer at Callsign Often, when people talk about trust in relation to a business, the terms priva..

Top 10 Considerations When Evaluating a Cloud Network Security Solution

Top 10 Considerations When Evaluating a Cloud Network Security Solution

By Jonathan Maresky, Cloud Product Marketing Manager at Check Point Software Cloud security has become business-critical as organizati..

Everyone’s talking about data – but do we truly understand it?

Everyone’s talking about data – but do we truly understand it?

By: Adrian Cooper, Field CTO for NetApp Public Sector Data is undoubtedly one of the buzzwords of the 21st Century. In business especi..

Survey Shows Changing Consumer Preferences in Restaurant Ordering for Both On-Site Ordering and Order Ahead / Delivery

Survey Shows Changing Consumer Preferences in Restaurant Ordering for Both On-Site Ordering and Order Ahead / Delivery

Most Americans prefer digital ordering over in-person.  Brooklyn, NY –  Koala, a leading provider of premium, customizable apps and we..

Key considerations for building an inclusive Digital Banking Experience fit for the Future

Key considerations for building an inclusive Digital Banking Experience fit for the Future

By: Rob McElroy, CEO Sopra Steria Financial Services  Digital is a considerable driver for change in Financial Services. One of the bi..

A new era for payments in the retail industry

A new era for payments in the retail industry

By: Rene Pomassl, CEO at fintech Salamantex Bitcoin has been around since 2009, and we saw a period of activity and excitement in late..

The truth about your data: why cloud infrastructure needs to be better protected

The truth about your data: why cloud infrastructure needs to be better protected

In this article, Phil Bindley, Managing Director of Intercity Technology’s Cloud and Security division, outlines the most important da..

The Necessity of Post-COVID Digital ID

The Necessity of Post-COVID Digital ID

By Dick Dekkers, Director of Business Development, Digidentity As part of its Government Digital Service (GDS) strategy, the UK is aim..

Cycloid unveils Infra Import to ‘reverse engineer’ Terraform Infra-as-Code from Manual Deployments

Cycloid unveils Infra Import to ‘reverse engineer’ Terraform Infra-as-Code from Manual Deployments

PARIS, FRANCE – 29 July 2021 – Cycloid, the hybrid-cloud DevOps collaboration platform for building end-to-end frameworks, has today u..