
Sponsored Don’t forget physical security!
With all the focus on IT security, it’s easy to overlook the importance of comprehensive physical security. Conpato’s Stefan Nilsson tells you what you need to know
With all the focus on IT security, it’s easy to overlook the importance of comprehensive physical security. Conpato’s Stefan Nilsson tells you what you need to know
AI like ChatGPT, ERNIE and Bard could help attackers craft much more sophisticated and harder to identify cyber attacks, warns Platform.sh’s Joey Stanford
Beware of dangling domain records
Make sure it's in a good location and secure
All very useful, till it leaks
A checklist of things to watch for
While the terminology has changed the challenge remains the same
It's no good controlling access to your data and ignoring what happens to it after it has been accessed
Criminals are already storing up data for the day when quantum computers break all known encryption algorithms. Here's what you need to do
Take these three steps
Is data center operational technology the weak link in the fight against cyber attacks?
Don't rely on any single measure of security
Evolving security practices take on an increasing complex environment
The biggest security threat to edge data centers might not be cyber miscreants penetrating the firewall, but very ordinary miscreants simply coming through the door, warns RF Code’s Gregg Primm
It's ten years since Office 365 - now Microsoft 365 - arrived on the scene. What have we learnt?
The world has changed - keep your staff up to date
If they can hit pipelines, data centers could be next
Open source has become an indispensable part of many companies, yet some stubborn prejudices about the supposed insecurity of open source solutions persist
Let's grasp the nettle
After 2020, does it really make sense to try and predict?
No one expected the pandemic. There were some other things we didn't foresee...
Advancements in technology have enabled telework across a host of sectors, yet most companies, even technology giants, lack the digital infrastructure to enable this at a large scale
Why is there a growing appetite among IT leaders for cloud-enabled physical security?
Under new cryptography regulations, Chinese authorities will have full, unrestricted access to any data transmitted or stored within the country. Can anything even be done about this?
Encryption must be applied much further up the business and more comprehensively across the technology stack
Edge computing puts processing power at the source of IoT data, meaning that not only can data be analysed as soon as it is generated, but secured too
An organization should consider all its requirements when choosing a third-party provider for its cloud service — not only in terms of features but also in terms of security and access control
There is a much documented sense of wariness towards big data applications and the commercial use of personal data by private companies