Who is invited to your cloud strategy party?

We’ve all worked for companies where core IT decisions are made by a few leaders in…

liquid

What is a liquid? A liquid is a type of matter with specific properties that make…

Consumers to get new protections against dodgy apps

The government is today setting out plans for a voluntary code of practice governing operators of…

Fantasy – a new Agrius wiper deployed through a supply‑chain attack

ESET researchers analyzed a supply-chain attack abusing an Israeli software developer to deploy Fantasy, Agrius’s new…

Use NFPA data center standards to help evade fire risks

Fire protection for data centers is complex. Reliability and business continuity are essential, and organizations should…

Clinicians who raised patient safety risks claim Berkshire NHS trust deleted email evidence

Two clinicians who say they lost their jobs at Berkshire Healthcare NHS Foundation Trust after raising…

Complexity is the enemy of cloud security

It’s a fact that most enterprises put security teams and tools in a silo. It drives…

green IT (green information technology)

What is green IT? Green IT (green information technology) is the practice of creating and using…

Legacy IT magnifies cyber risk for Defra, says NAO

While the Department for Environment, Food and Rural Affairs (Defra) is making progress on tackling the…

Complexity is the enemy of security

It’s a fact that most enterprises put security teams and tools in a silo. It drives…

Translate »