• HOME
  • Industry Insight & news
  • Press releases & updates
  • Downloads & Resources
DTX Main Header
IP EXPO
Cyber Security
AI-Analytics

Industry Insight


Centre stage with Dr Nicola Millard, Head of Customer Insight and Futures at BT…
Centre stage with Dr Nicola Millard, Head of Customer Insight and Futures at BT…
2019-02-22T00:00:00Z

A topical Q&A with a leading light within the IT community, discover more about what Nicola's day to day consists of, why she chose IT as a career, how to be successful in IT, and her predictions for the future...

READ MORE
Successful IoT Projects: The Key Role of Automation
Successful IoT Projects: The Key Role of Automation
2019-02-18T00:00:00Z

The Internet of Things (IoT) is placing huge challenges on network managers across all industries. With booming endpoint numbers and generated traffic, device management and network efficiency become of paramount importance.

READ MORE
AI in Cyber – Challenges and Solutions
AI in Cyber – Challenges and Solutions
2019-02-18T00:00:00Z

Jamie Graves from ZoneFox gives an insight into how we can use AI more effectively. It was standing room only when Jamie Graves of ZoneFox took to the stage at AI-Analytics X to discuss the strengths and weaknesses of AI.

READ MORE
Don’t miss your chance to see Christopher Wylie at IP EXPO Manchester 2019
Don’t miss your chance to see Christopher Wylie at IP EXPO Manchester 2019
2019-02-13T00:00:00Z

The New Yorker calls Christopher Wylie “a pink-haired, nose-ringed oracle sent from the future." But he’s probably best known for his role in setting up – and then taking down – the cyber-warfare firm Cambridge Analytica!  

READ MORE
Unbelievable tales of cyber-attack – You won’t read about these in the media!
Unbelievable tales of cyber-attack – You won’t read about these in the media!
2019-02-13T00:00:00Z

In Graham Cluley's absolute belter of a session, we delve into the extraordinary, like the companies who pretend to be hacked when they haven’t, or the attackers who went to exceptional lengths to steal millions from their employers.

READ MORE
Vaporworms – The Top Threat of 2019?
Vaporworms – The Top Threat of 2019?
2019-02-13T00:00:00Z

Anyone that’s been paying attention knows that fileless malware has been on the rise for the past few years. But, did you know that we’re likely to see this infamous threat transform in new and menacing ways this year? Enter the Vaporworm. 

READ MORE
CSPs Must Adapt to Getting Older
CSPs Must Adapt to Getting Older
2019-02-13T00:00:00Z

Today, cloud services providers (CSPs) are facing their own signs of aging. Discover the problems for maturing CSPs and their data centre operations. 

READ MORE
OpenSource The DevOps Enabler
OpenSource The DevOps Enabler
2019-02-06T00:00:00Z

There is growing pressure on IT to provide faster and more agile platforms for business, Red Hat’s James Allen discussed why those adopting open source tooling and practices are succeeding at the expense of those who don’t.

READ MORE
Operators of the TheMoon botnet offer it as a service
Operators of the TheMoon botnet offer it as a service
2019-02-06T00:00:00Z

Researchers at the CenturyLink Threat Research Labs discovered that the operators of the TheMoon IoT botnet are offering it as a service.

READ MORE
Ensuring Cloud Independence
Ensuring Cloud Independence
2019-01-30T00:00:00Z

By 2020 over 90% of companies will be utilising cloud services offered by multiple providers, using various orchestration tools. To ensure they retain full mobility and flexibility, businesses need to be wary of components which could potentially cause cloud lock-in. 

READ MORE
Using the Sith mind-set to build and hone a Jedi SIEM
Using the Sith mind-set to build and hone a Jedi SIEM
2019-01-30T00:00:00Z

Samantha Humphries, Senior Manager of Global Markets & Compliance at Rapid7 discusses SIEM myths, how to arm your Jedi (first responders), analytics and more. Discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today. 

READ MORE
Bringing together Blockchain, Internet of Things and Artificial Intelligence: Turning Skynet into reality
Bringing together Blockchain, Internet of Things and Artificial Intelligence: Turning Skynet into reality
2019-01-23T00:00:00Z

The events of annus horribilis 2008 changed the world forever. The change was dubbed the "New Normal" and in turn gave rise to shifts in economic and political power which would have been considered the stuff of fantasy fiction as 2008 came to a close.

READ MORE
Getting the most out of people counting technology
Getting the most out of people counting technology
2019-01-23T00:00:00Z

People counting technology is regarded as one of the most effective ways to understand how a building functions throughout the working week. This kind of intelligence is invaluable for many businesses but none more so than support service providers looking to gain a more accurate way to deploy resource and make increasingly thin margins more profitable. 

READ MORE
Giving WAN an edge
Giving WAN an edge
2019-01-16T00:00:00Z

SD-WAN is now making its case. Allan Paton, Director of UK and Ireland at Silver Peak explores the evolution of SD-WAN and how it will replace the complexity of router-centric WAN architectures.

READ MORE
Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections
Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections
2019-01-16T00:00:00Z

Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to bypass protections using zero-width spaces and deliver malicious messages to recipients.

READ MORE
Take it on the chin?
Take it on the chin?
2019-01-10T00:00:00Z

Are British businesses firing employees unfairly as a result of possible data breach negligence? Ian Osborne, Vice President UK & Ireland at Shred-it, tackles this thorny issue.

READ MORE
Security of IoT in the Smart Office
Security of IoT in the Smart Office
2019-01-10T00:00:00Z

In 2018, 11.2 billion devices worldwide are connected to the internet, and it is predicted that by 2020, a staggering 20.4 billion devices will be connected.

READ MORE
The lifeblood of Artificial Intelligence
The lifeblood of Artificial Intelligence
2019-01-02T00:00:00Z

While everyone seems to be treating ‘artificial intelligence’ as the latest in-vogue topic, it’s important to remember it is far from a new development. It is not my intention to dilute the excitement of AI’s minefield of potential but, like anything that has the power to change the world, it requires an element of respect and a lot more know-how. 

READ MORE
Security researchers at Trend Micro recently discovered a PowerShell-based backdoor that resembles a malware used by MuddyWater threat actor.
Security researchers at Trend Micro recently discovered a PowerShell-based backdoor that resembles a malware used by MuddyWater threat actor.
2018-12-11T00:00:00Z

Malware researchers at Trend Micro have discovered a Powershell-based backdoor that is very similar to a malware used by MuddyWater APT group.

READ MORE
Azure migration – the view from the DevOps Manager
Azure migration – the view from the DevOps Manager
2018-12-04T00:00:00Z

Ed Broking is a wholesale insurance and reinsurance broker, sourcing policies and coverage across a broad range of industries. Based in London, Ed Broking operates a number of international offices to support their global operations. Faced with replacing an ageing hosted server system, Ed Broking took the decision to move to fully hosted Microsoft Azure platform. This is their story.

READ MORE
Media in the cloud
Media in the cloud
2018-11-28T00:00:00Z

The cloud is driving change in the media industry at an incredible rate, thanks to benefits achieved by its scalability and affordability. In an exclusive roundtable interview, industry experts debate the unique needs of the sector and outline strategies for success in the years ahead. 

READ MORE
Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW
Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW
2018-11-28T00:00:00Z

Security experts at Imperva reported an attack against Drupal Web servers running on Linux-based systems. Hackers exploited the Drupalgeddon2 flaw (CVE-2018-7600) along with other issues. The Drupalgeddon2 could be exploited to take over a website, it affects Drupal versions 6, 7 and 8.

READ MORE
IoT in the shadows
IoT in the shadows
2018-11-19T00:00:00Z

BYOD is a thing of the past - or is it? Gary Cox, Technology Director for Infoblox in Western Europe, explores the troubling rise of Shadow IoT and how to detect it. With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices to enterprise networks, IT teams find themselves faced with greater complexity and more security issues than ever before.

READ MORE
The currency of blockchain
The currency of blockchain
2018-11-19T00:00:00Z

Blockchain is more - much more - than Bitcoin. Jonathan Wilkins, Marketing Director at EU Automation explains how blockchain can automate a range of business processes. Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born in 1975, but there remains speculation about the inventor's true identity.

READ MORE
"Give 110 percent" voted the most-hated office jargon of 2018
2018-11-15T00:00:00Z

The survey, which was conducted at IP EXPO 2018, found that over a quarter (26 percent) of the IT professionals questioned selected “Give 110 percent” as their most frustrating office jargon of the year, followed by "Blue sky thinking" (19 percent), and "Low hanging fruit" (17 percent).

READ MORE
Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
2018-11-14T00:00:00Z

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a local attacker to decrypt data.

READ MORE
Poor User Experience? DNS Can Help
Poor User Experience? DNS Can Help
2018-11-14T00:00:00Z

Today, the user experience of digital services has the greatest impact on the perception of an organisation’s ability to operate competently and successfully in a digital world. It is the key competitive differentiator, and is essential for avoiding the risk of customer churn.

READ MORE
Five key factors to delivering optimal user experience for AWS
Five key factors to delivering optimal user experience for AWS
2018-11-01T00:00:00Z

Whether or not you literally “own” the infrastructure, application or networks that deliver your apps and services, as an IT leader or technology professional you own the outcome. Here are five factors that you should consider to deliver an optimal user experience while using AWS.

READ MORE
Will serverless fulfill the expectations of cloud?
Will serverless fulfill the expectations of cloud?
2018-11-01T00:00:00Z

The term cloud computing became popular somewhere halfway the first decade of this century, short before the launch of Amazon S3 and EC2. In the little over 10 years since, we have come a long way. However, I believe we still have to uncover the full potential of cloud computing. Although not part of the formal characteristics of cloud computing, there have been are two simmering expectation of cloud computing that we have failed to meet up to now. 

READ MORE
Tackling security in the public and private cloud
Tackling security in the public and private cloud
2018-11-01T00:00:00Z

The Challenge: Modern data centre's are changing rapidly. Thanks to virtualisation, more and more organisations are shifting to resilient, on-demand, private cloud environments, delivering applications faster and more cheaply than ever before. Software defined data centre's (SDDCs) are the new norm. 

READ MORE
CIO's are feeling the need for speed
CIO's are feeling the need for speed
2018-11-01T00:00:00Z

The warnings have been out there: Mobile and social accelerating customer interactions. Big data providing deep lakes of potential knowledge. Billions of connected gadgets bringing forth a global Internet of Things (IoT).

READ MORE
Open source as the basis of enterprise
Open source as the basis of enterprise
2018-11-01T00:00:00Z

We think of Enterprise organisations as closed societies, working in isolation in pursuit of the advantage over their competitors. It might come as a surprise then to think about how much Open Source software is used within even the largest and most secretive companies around the world.

READ MORE
The convergence of data science and software development
The convergence of data science and software development
2018-11-01T00:00:00Z

There is no need for data scientists to be outright software experts thanks to emerging tools for using data delivered through the cloud. Making use of the cloud as a shared platform ensures the delivery of the right data to the right people at the right time, without the inefficiency of workflows passing through many hands through hand-overs.

READ MORE
Good logging - the foundation of operability for serverless and IoT
Good logging - the foundation of operability for serverless and IoT
2018-11-01T00:00:00Z

Serverless is an emerging “new normal” for web-based applications and services where the unit of deployment and billing is a single function a few lines of code in length. Serverless enables radical transparency in billing and radical ease of use for developers; when combined with with marketplace (“app store”) offerings from cloud vendors like AWS. 

READ MORE
Hacking the Blockchain
Hacking the Blockchain
2018-11-01T00:00:00Z

Due to its cryptographic background, a common perception is that blockchain is inherently secure. But blockchain is not un-hackable or hidden from potential manipulation.

READ MORE
It's time to stop ignoring IoT security
It's time to stop ignoring IoT security
2018-11-01T00:00:00Z

Smart homes and smart cities will likely be top of mind in conversations around the Internet of Things (IoT), but the application of IoT is becoming far more widespread than these two areas as a growing number of industries adopt IoT devices.

READ MORE
Exploring an AI foundation for the network in the IoT age
Exploring an AI foundation for the network in the IoT age
2018-11-01T00:00:00Z

With the soaring number of mobile and IoT devices, and the onslaught of new apps that businesses are faced with on their wireless network, it is time for innovation that can help IT scale and meet these new requirements. 

READ MORE
Blood diamonds to voter fraud - do you know what Blockchain is capable of?
Blood diamonds to voter fraud - do you know what Blockchain is capable of?
2018-11-01T00:00:00Z

Our recent research uncovered that just over a third of Brits (35%) would not trust an organisation using blockchain technology to keep their information secure. But with so many uses beyond recording cryptocurrency transactions, we think people need to wake up to the real potential for blockchain. Here are five of the most interesting use cases for blockchain from the last year. 

READ MORE
Five ways AI is augmenting our lives
Five ways AI is augmenting our lives
2018-10-31T00:00:00Z

AI and robotics are going to create almost 60 million more jobs globally, that’s according to a new report from the World Economic Forum. The Swiss think tank released its Future of Jobs report to put facts behind the much-debated topic of AI and job displacement.

READ MORE
Workplace of the future: collaboration of human and AI
Workplace of the future: collaboration of human and AI
2018-10-31T00:00:00Z

Today the world faces one of its most daunting, but also exciting tasks - how organisations will transition into the future with Artificial Intelligence entering the workplace. However we look at it, AI directly threatens a large portion of the global workforce whose jobs will be competing with digitisation, automation, and continuously improving AI. 

READ MORE
Blockchain workforce development
Blockchain workforce development
2018-10-31T00:00:00Z

With the explosion of cryptocurrency over the past of years, many have been debating the longevity and legitimacy of cryptocurrencies in our global economy. However, those with a keener eye were fascinated with something far more useful and widely applicable: Blockchain — the technology that made cryptocurrency possible in the first place.

READ MORE
Why leading companies are paying hackers for security help
Why leading companies are paying hackers for security help
2018-09-16T23:00:00Z

Cybercriminals have never been so notorious. As technology innovation seems to outpace security defenses, organizations are turning to ethical-hackers to assess risk and see where they are most vulnerable.

READ MORE
Want to hire the best AI talent?
Want to hire the best AI talent?
2018-09-10T23:00:00Z

Dr Greg Benson, Professor of Computer Science at the University of San Francisco and Chief Scientist at SnapLogic, shares his tips for hiring the best AI talent and a what it means to work across both industry and academia for AI development.

READ MORE
Poison pixels
Poison pixels
2018-04-16T23:00:00Z

Stegware, the weaponisation of steganography by cyber attackers, is on the rise. Find out why this is bad news for IT professionals. 

READ MORE
Thinking like a cyber adversary
Thinking like a cyber adversary
2018-04-10T23:00:00Z

In a world of sensitive data and tightening regulations, discover what you should do as an organisation!

READ MORE
The social good of AI and advanced analytics
The social good of AI and advanced analytics
2018-04-09T23:00:00Z

On any given day AI is both the saviour and the doom of human kind. Opinion on the technology can change as quickly as the wind. But behind the curtain of doubt AI programs are already making incredible benefits to our lives, often without us even realising.

READ MORE
Cybersecurity in the NHS – separating people from passwords
Cybersecurity in the NHS – separating people from passwords
2018-03-27T23:00:00Z

Troublesome political climate has put the NHS, like many other Public-Sector organisations, under immense pressure to cut costs and drive operational efficiencies whilst simultaneously embracing new digital methods, in a bid to improve services. As a result, proper and necessary data security controls have not yet been totally embraced…

READ MORE
Hospital closure ranks top for british cyber fears
Hospital closure ranks top for british cyber fears
2018-03-05T00:00:00Z

From ransomware and exploding power plants to AI and identity theft - new survey from IP EXPO Manchester uncovers the cyber fears of the UK. 

READ MORE


IP EXPO Nordic 
co-located with
Digital Transformation EXPO

IP EXPO
Cyber Security X
AI-Analytics X

Digital Transformation
EXPO Europe
 

IP EXPO
Cyber Security X
AI-Analytics X

IP EXPO Manchester
co-located with
Digital Transformation EXPO

IP EXPO
Cyber Security X
AI-Analytics X

© Copyright 2018 – Imago Techmedia | Website content is valid at the date of publishing and therefore can be subject to change

Disclaimer: Imago Techmedia is not responsible for the content of speakers and seminars, and any information and opinions shared does not necessarily reflect the views or opinions of Imago Techmedia or associated brands.

TERMS & CONDITIONS | PRIVACY & COOKIES POLICY