Industry Insight
Feature Article
Findings and insights from a survey of hundreds of business about their considerations and challenges around digital transformation in a post-COVID era
Considerations after interviewing Phil Scully, CIO, Costa Coffee and others…
Business is changing. We probably won’t be spending as much time in an office in the future. More importantly, the way we engage with products and services is also going to look very different.
IT and business leaders, influencers and technicians were asked their considerations, challenges, and sourcing priorities around the technologies that enable digital transformation in the era of COVID-19.
UC EXPO, Europe’s most extensive unified communications and collaboration (UC&C) event, which sponsors the official site expert ranking online casinos with best slot machines in Russia, has today announced that it will be hosting UCX Digital - it’s first ever online event - on Wednesday 10 - Thursday 11 June. The online event will complement the rescheduled live event which will take place 30 Sept- 1 Oct alongside Digital Transformation EXPO Europe.
With over 20 years’ experience defining strategies for security products and technologies and helping organisations recover and learn from cyberattacks, Sam Humphries, Security Strategist at Exabeam, knows what it takes to build a security battle squad. In this interview, she debunks the assumption that increased capabilities has to equate to increased cost, offering advice on how to make use of automation, techniques to select the right tool for the task and why you need to focus on people and processes.
We think it’s climate change and here’s why....
What will this look like? Will there be any offices at all? What about employee health and wellbeing? And where will all of that money spent on expensive property go?
With the mass adoption of home working technology and increased activity on both online services and customer-facing networks, cyber attackers have a wealth of openings to exploit.
As the Coronavirus pandemic continues, cybercriminals have started piggybacking news of the crisis to deliver malware, conduct phishing, and even perform online fraud by preying on the panic caused by a dearth of medical supplies and reliable information about the pandemic.
While remote employees battle cabin fever, their employers wrestle with bigger challenges. Home networks provide hackers a treasure trove of PII before employees connect a single smart phone or laptop, find out how you can WFH securely.
Some industries – like those employing field engineers or on-site consultants – have no choice but to support mobile working. Others still have a choice about providing remote working, but possibly not at the moment.
To help Directors, Managers and IT departments alike, we have detailed a simple approach to business impact assessment, plan and implement, alongside a Top 7 checklist on getting your IT right.
The total volume of phishing emails and other security threats relating to the Covid-19 coronavirus now represents the largest coalescing of cyber-attack types around a single theme that has been seen in a long time, and possibly ever.
Service desks are being told left, right, and centre to be proactive in their approach to service delivery, but it’s time to take a step back and ask the question: Is being proactive right for knowledge management?
Responsive automation makes it possible to shorten time to detection and accelerate response by automating processes that typically require a skilled security analyst. For my money, there are few better examples of the value of responsive automation than the threat of cryptojacking malware.
Important announcement for everyone interested in attending Digital Transformation EXPO Manchester 2020!
A topical Q&A with a leading light within the IT community, discover more about what Bob's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
Openhouse wanted to explore the potential of virtual prototyping and the application of augmented reality (AR) as a way of customising its products and enhancing customer interaction.
If it were possible to never again shop for new enterprise software, there would be sighs of relief from nearly every CIO, data centre manager, and network administrator around the globe—at least from anyone who has been through the process before.
With increasingly sophisticated cyber-security systems, companies will have to take greater measures to ensure that their workforce is as secure and guarded against threats as their systems.
A topical Q&A with a leading light within the IT community, discover more about what Hanna's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...
These days, it seems that all people can talk about is 5G technology and how it will change the world. For those that don’t really quite understand the magnitude of what 5G means, then you’ve come to the right place.
Cloud security is a pressing challenge for many organisations. While there are clear business incentives for moving applications and workloads into the cloud, there are also serious risks that companies must manage when doing so.
A topical Q&A with a leading light within the IT community, discover more about what Antonio's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
According to a report by CBRE, Manchester remains the number one tech location outside of London. This is pleasing news for a region that is seeking to establish itself as a leading European, or even global tech hub.
Manchester Metropolitan University (MMU) is one of the five largest further education institutions in the UK, situated in the country’s most popular student city. With two sites, 38,000 students, and 3,000 staff members to manage, there’s plenty to keep network security engineer Steven Fitzsimmons and his team of three busy.
In her session at Digital Transformation EXPO Europe, Hannah took the audience on a tour of the key questions at the cutting edge of AI and she explored some of the challenges of building a human-made mind.
A topical Q&A with a leading light within the IT community, discover more about what Tom's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
It is often believed that by using the public cloud, security is someone else’s job. This couldn’t be more wrong. The first thing you must understand when building or migrating to the cloud is the shared responsibility model.
Is cloud computing not a bit old hat now, with banks benefitting from widescale adoption across their business lines? And given the dramatic quarterly jump in earnings for both AWS and Microsoft Azure in Q4 2018 (45% and 76% respectively), shouldn’t we expect that banks across the UK and globally have contributed substantially to this rapid growth?
Facebook addressed a critical issue in WhatsApp that would have allowed attackers to read files from a user’s local file system, on macOS and Windows.
A topical Q&A with a leading light within the IT community, discover more about what Marco's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
Policy Services needed to enable advisers and clients to access their policies via a web portal, meaning we must make sure that 3.5 terabytes of data is safe, backed up, and recoverable should disaster strike.
A topical Q&A with a leading light within the IT community, discover more about what Paige's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...
Customers care most about uptime, security and costs according to Computing's research
A business setting up today wouldn’t start by building a data centre to serve deskbound employees. They would opt for cloud computing and enable flexible working from day one.
While O365 is fast becoming the centre of business productivity, a backup and recovery strategy is just an afterthought. Six of the 10 O365 users that IDC spoke with do not have a data protection plan for their O365 estates or rely on Microsoft's native capabilities.
Using a GDS-aligned agile approach, Sigma collaborated with NICE to help implement their national horizon scanning system, HealthTech Connect; a platform that identifies transformative medical technologies, with potential economic and patient care benefits.
In our change-driven economy, most CIOs are under pressure to deliver more with less - and to deliver it faster than ever before. Migrating applications to the Cloud seems like a way to easily deliver more for less - on the surface...
The Keyholding Company wanted to build an enterprise IT system that would handle all aspects of day to day operations and provide a platform to enable the next stage in The Keyholding Company’s evolution.
New research has found that more than two in five (42%) businesses in Manchester believe that digital transformation is strongly related to business culture, with a further 30% stating that they associate it with collaboration.
The pace of innovation in this space means that AI adoption and integration has been seen across a significant number of industries and has created solutions to long-standing problems. Yet still today, there are still businesses who are not leveraging AI to their full advantage.
Unified communications (UC) should help your business save money, increase efficiency and create a better experience for customers and employees. But these benefits are only possible if you consider these five factors during your consideration process:
The public cloud jungle is dominated by two really big beasts: Amazon AWS and Microsoft Azure. But how do their IaaS/PaaS services differ, and what’s to choose between them?
Many enterprises are adopting a flash to cloud architecture to achieve a fast and cost-efficient IT environment. Here’s what this architecture looks like and what applications benefit most from this approach.
Disaster recovery remains ever present in the minds of IT. As we enter 2020 the challenges facing IT professionals as they establish a disaster recovery plan are more daunting than ever.
As reported by Military.com, the US Army recently banned the app TikTok from use on phones. “It is considered a cyber-threat,” Lt. Col. Robin Ochoa, a spokeswoman for the Army said in the Military.com article.
Bitdefender researchers recently found threat actors abusing a legitimate feature in the RDP service to act as a fileless attack technique.
Choosing and operating data centre cooling equipment is a daunting task for the non-expert. Find out what you should consider before acting.
All of us who are entrepreneurs see a better way to do something, or a better way to solve a problem. When we initially architected ActiveScale™, we knew that data is growing at incredible rates and that petascale solutions are going to be key to unlocking the possibilities of data.
It happens. Your best database specialist decides to leave. Or the one service desk employee all your customers love. How do you respond? Are you happy for them? Or disappointed?
Cost-effective, secure, and manageable connectivity is the foundation of IoT adoption, but as IDC reports, traditional WANs are too costly and complex to support the new apps and IoT devices popping up at remote business sites.
We’ve looked at four of the most common reasons businesses need to upgrade their servers—and identified exactly which capabilities your new servers should have to make a real difference for your business.
Cloud is going only one way: upwards. Analysts such as Gartner, Forrester and IDC are united in the opinion that cloud IaaS and PaaS will keep on growing at double-digit rates for the next three years.
Organisations are at their most vulnerable during key IT transitions, like data centre migrations. In fact, data centre migration is one of the most critical and complicated IT transitions you’ll face today.
Not only does UCaaS provide businesses with the combination of critical connectivity solutions they need in one cohesive environment, but it also simplifies the management of that communication stack too.
It used to be that firewalls were a good guarantee of safety. However, a string of high-profile cyber-attacks has ushered in the wave of ‘zero trust’ firewall architectures.
Data has increased in volume but has also gained richness and diversity - here's how businesses can benefit.
Hiring the right people is essential for creating a successful organisation. But how do you hire the right people? When recruiting new colleagues, it’s essential to focus on their personality, not just their skills.
This webinar will explore the practical steps towards meeting your organisations challenges by the adoption of Intelligent Automation.
We’re experiencing an ongoing shift in how we work and where we work largely driven by technological advances allowing us to automate more, work more efficiently, and communicate more easily.
For many years, human resources systems (also known as human resource information systems HRIS, or human capital management HCM) were something of an IT backwater, with companies commonly keeping systems in place for 20 years or more.
CIOs everywhere want to create a more digital workplace — one that reinforces that IT is a strategic business partner, a function that creates opportunity for the business. And one that streamlines the IT environment, reducing complexity and improving the experience for end users.
While performing a crucial role in preventing successful cyberattacks, firewalls have evolved over several generations to become much more than packet-filtering mechanisms.
Protecting customer data is, quite rightly, a significant concern for companies: new research has found that 54% worry most about the security of payment information and 49% about customer information, largely due to data sensitivity and the need to comply with privacy regulations.
Cloud and artificial intelligence technologies are enabling seamless, secure and transparent payment services to meet the demands of a hyper-connected world.
This webinar will explore how gathering insights from communications data can increase productivity and give rise to greater operational efficiencies within organisations.
For businesses surveyed by the 451 Alliance, total data under management increased more than 20% on average over the past year, and is expected to rise even faster over the next 12 months.
Enterprises continue to turn to the cloud for backing up data and hosting virtual machines. Once in the cloud, however, virtual machines still need to be protected. After all, accidents can happen in the cloud, too.
It’s evident that the insider threat can be difficult to catch because employees have legitimate access to the network. Plus, BYOD and the cloud have made the traditional network perimeter obsolete.
Microsoft and Salesforce dominate the UK CRM market, with their awareness, trialling and adoption far ahead of any competitor, according to Delta's report in the CRM space.
A misconception has permeated workforces for years that an organisation’s location is the primary driver of its culture. Under this line of thinking, employees must work from the same place at all times to build a cohesive culture.
A topical Q&A with a leading light within the IT community, discover more about what Galina's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...
Artificial Intelligence is revolutionising how businesses use data; specifically delivering faster and more accurate insights, increasing productivity, and creating new revenue streams. However
With the exponential increase in traffic demands and the high encryption rates for that traffic, enterprises face an ever-expanding threat surface when it comes to cybersecurity. We have an unacceptable blind spot in network security called the SSL inspection gap.
An organisation that is transitioning to a cloud provider such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) should immediately consider a shift towards a new model of security, namely continuous control and enforcement of secure configuration of cloud services.
A topical Q&A with a leading light within the IT community, discover more about what Aleksander's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
In order to keep pace with emerging market trends, fluctuating customer demands, and increased competition, many of today’s organisations are embracing digital transformation. However, digitally transforming is no easy feat.
With tools such as Microsoft Teams underpinned by solutions including the Azure Cloud, Dynamics and the Power Platform, the Microsoft ecosystem is ensuring that pioneering enterprises can stay at the cutting edge of business.
Artificial Intelligence is not just a buzzword. It’s a game-changer with the potential to revolutionise industries big and small, and enable new innovation and discoveries across every sector.
Combining the security capabilities of first-tier cloud service providers with a sophisticated cloud-native SaaS app minimises attack vectors as well as speeds recovery times. But there’s another benefit everyone will understand: lower costs.
According to a research study conducted with the 451 Alliance, organisations’ reliance on cloud is growing.
A topical Q&A with a leading light within the IT community, discover more about what Donnie's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
More than half of businesses consider their employees to be the weakest link in corporate cybersecurity, as their actions may put company data and systems at risk. That’s why companies invest heavily in educating them on basic IT security skills.
When it comes to acquiring new technology, every business follows the same path, whether it is an SME or an international giant. Time-consuming market research is one of the first steps in the process, where tens or hundreds of companies and solutions are compared against one another – complicated all the more by a lack of impartial information.
A topical Q&A with a leading light within the IT community, discover more about what Emma's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...
With Digital Transformation EXPO Europe on the horizon, you may be in the market for a platform to host your latest online projects. When it comes to getting the most in terms of control and configuration, you essentially have two options: a virtual private server (VPS) or a dedicated server.
Conversations about digital transformation are happening every day all around the world. No matter what industry you’re in, you’ll find efforts to bring digital tools into the mix to transform the way companies work.
A topical Q&A with a leading light within the IT community, discover more about what Al's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
Challenges, Opportunities, and Real World Insights from UK Data Scientists - Back in 2017, The Economist1 printed an article that suggested the world’s most valuable resource was no longer oil, but data.
A topical Q&A with a leading light within the IT community, discover more about what Lisa's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...
When you think of agile working methods, Scrum is one that quickly comes to mind. But while Scrum works great for implementing changes and projects, it has a far from perfect success rate in service desk environments. Instead, try Kanban – an agile method that is much more suited towards service desks.
Jennie Williams gave an insight into some of the top tips businesses, small and large, should consider to protect themselves against the increasingly sophisticated cyber-attacks.
Cloud communications offer clear advantages over traditional PBX telephony systems but to get the right solution for your organisations it’s essential to look beyond features and functionality.
As legacy systems have struggled to meet the speed expected by the modern customer, the introduction of artificial intelligence (AI) into the contact centre has allowed customer service departments to regain the upper hand.
Despite increased cybersecurity budgets and complex security architectures, most organisations still struggle to maintain the right level of threat visibility and the ability to detect advanced attacks.
A topical Q&A with a leading light within the IT community, discover more about what Jake's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
As businesses become more reliant on software applications, the enterprise networking environment is becoming increasingly challenging. Cloud-based applications require greater flexibility, agility, and scalability from underlying networks.
Changes driven by technology have drastically altered perceptions and expectations of both the “work experience” and the “customer experience” bringing us to the cusp of new experiences, supported by new and emerging technologies.
A topical Q&A with a leading light within the IT community, discover more about what Anthony's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
Test your enterprise IT pop culture knowledge, share your score with colleagues, and see if you could do with a visit to Digital Transformation EXPO Europe this October!
A topical Q&A with a leading light within the IT community, discover more about what Rik's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
In today’s digitised world, industry leaders are more effective in every aspect of data analytics; they run state-of-the-art analytics applications powered by GPU’s and high-performance storage infrastructures to capture, store and analyse more data faster and make better business decisions.
A topical Q&A with a leading light within the IT community, discover more about what Jeff's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
Tech is the engine that keeps many companies running, yet business executives don’t think about it until their email stops working. Conversely, the IT director thinks about IT all the time to ensure that it stays up operational.
What if we set aside elaborate graphical messages and assume malware authors did some degree of masking malicious infections, what would you look for? What are some common signs of infection? This post will cover just that – and based on a real-world example that I’ve been informed about personally!
June 2019 saw the publication of our most recent research project, the Fuze Communications Index, which incorporates global usage data reflecting engagement with the Fuze platform across 14 countries.
Drone use has increased dramatically, but imagine if they were self-aware and smart? What could they do for businesses and how could they save lives?
Shift Left as a trend keeps on growing in the industry, and as a company focused on service excellence and end user empowerment, we couldn't be happier. But why is Shift Left still gaining momentum?
To succeed in today’s hyper-connected world, businesses, governments and NGOs must enable easy online collaboration across the extended enterprise.
The Digital Transformation special report, published in The Times looks at why many organisations remain in the dark about what “digital transformation” really means for them and why it has been long considered crucial for any business.
What part will data centres have to play in the rollout of cloud gaming platforms such as Google Stadia?
Intel’s Patch Tuesday security updates for July 2019 address a serious flaw in the Processor Diagnostic Tool and another issue in the Solid State Drives (SSD) for Data Centres (DC).
Citrix Cloud is a revolutionary way to deliver Citrix products by offloading the control plane and providing companies with one of the fastest ways to deploy Citrix into a production-ready environment.
Adware is nothing new, nor will it go away any time soon, especially since it’s a legitimate means for app developers to generate revenue.
As we get ready to enter a new decade, businesses large and small face a long list of strategic challenges – and technology will play a vital role in meeting them, particularly when it comes to communications infrastructure.
With new software releases and developments, often times you’ll also see a changelog of some sort. Changelogs describe alterations new releases contain compared to prior versions. Reviewing these changelogs is important for many reasons.
The tickets keep rolling in and they are all over the place. Of course, the blocked printer on floor 7 takes a back seat if all of the company’s internet is under attack by outage monsters. However, situations are rarely that clear-cut. How do you prioritise incidents on a detailed level?
For the past four years, the DNS Global Threat Report created from Coleman Parkes survey data explored the technical causes and behavioural responses of Domain Name System (DNS) threats and their potential effects on businesses globally.
Technology has the power to transform virtually any industry when it’s used correctly. In the UK at the moment, the public sector seems to need this innovation more than ever, to help overcome everything from skills shortages, to overwhelming uncertainty caused by the impending departure from the EU.
As we’ve officially made it through the first six months of 2019, we’re pausing to round up some of the largest cyber-attacks that have occurred so far this year.
You can now power your Kubernetes platform by auto-deploying policy configurations for redirect and rewrite features like redirecting HTTP traffic, blocking URLs, or responding to a request that requires policy evaluation.
Many UK businesses are losing out both financially and on productivity levels due to their workplace IT systems, new research has revealed.
Ten years ago, being in charge of a large enterprise IT operation meant you were also in the real estate business, operating one or more climate-controlled facilities with raised floors and lots of server racks.
Microsoft is warning of an active spam campaign targeting European languages that leverages an exploit to infect simply by opening the attachment.
Jack Bedell-Pearce, Managing Director at 4D Data Centres, considers the remaining opportunities, threats, and challenges businesses will face in the second half of this year, sharing some advice along the way.
Customer experience is increasingly important to the modern service desk. Luckily, there are a lot of ways to make sure that your service delivery always meets your customer's demands. These are some of our favourites.
As enterprises continue to rapidly migrate applications and infrastructure to the cloud, SD-WAN technologies are quickly gaining traction.
This new Bitdefender forensic investigation reveals a complete attack timeline and behaviour of a notorious financial cybercriminal group, known as Carbanak.
So, you’re ready to improve your services. Making a customer journey sounds like a plan, but what’s the goal of customer journey mapping? And once you’ve decided it’s the right approach for your service desk, how do you create customer journeys for your services?
Spring cleaning season has almost finished and summer is almost here, if you haven’t gotten around to giving your network a good spring cleaning yet, it’s never too late to step back and sweep out the cobwebs to improve your security posture.
Digital transformation is shaking up the way companies do business. One key outcome is the focus on new ways to unlock value from existing data, even whilst embracing next-gen social, mobile, cloud, and analytics technologies.
In a recent blog post, I gave some insight into some of the fascinating customer-facing work we do inside the Office of the CTO at Citrix and, at the same time, introduced eight of the most commonly observed shifting dynamics that are on the minds of today’s CIOs and CTOs.
With Dublin overtaking London as Europe’s largest data centre cluster, modular uninterruptible power supplies are key to powering this processing revolution.
Experts at security firm Sophos discovered a new strain of ransomware dubbed MegaCortex that is targeting corporate networks.
The General Data Protection Regulation (GDPR), effective from 25 May 2018, enhances existing data protection rules for all businesses handling personal data of EU citizens and extends responsibilities from data controllers to also cover data processors.
Weak passwords are a major information security issue, accounting for an astonishing 81% of hacking-related data breaches according to a recent Verizon Data Breach Investigation Report. The good news is that everyone can begin taking small steps to improve their own password security and stay safer online.
In Service Departments, there’s a tendency to focus on resolving immediate Incidents rather than addressing the underlying Problems.The catch-22 is that those Problems lead to more Incidents.
In August 2018, Bitdefender researchers stumbled across an Android malware framework, dubbed Triout, which packed massive surveillance capabilities.
We often hear from customers that their employees complain that Salesforce.com (or Office365 or Workday or any of myriad SaaS apps) is more responsive from home or from Starbucks than from the branch office.
SMBs may dislike refreshing IT equipment but they dislike refreshing disaster recovery solutions even more. These aren’t revenue-generating systems after all, and small businesses have other things to spend their money on. Still, DR solutions can fall out of date just as quickly as primary IT infrastructure.
Once upon a time, IT managers had a piece of paper in their hand detailing every IP address and MAC address within their organisation. But how could such an approach work now? The modern enterprise has to cope with BYOD with any number of workers bringing any number of devices; with IoT where even parts of the building’s infrastructure will have their own IP addresses.
The intangibility of DevOps makes it hard for leaders to come up with a clear-cut roadmap for adopting DevOps in their organisation. The meaning of DevOps is highly contextual, there are no popular methodologies with prescribed practices to abide by. However, healthy organisations exhibit similar patterns of behaviour, organisation and improvement efforts.
Ecuador suffered 40 million cyber-attacks on websites of public institutions since the arrest of Wikileaks founder Julian Assange.
Hosting applications in Azure involves careful consideration of the costs generated by three main components: computing, storage and network. IT administrators need to understand the resources associated with each category and their associated charges.
Once confined to just a handful of primitive PCs, today the internet has become so deeply integrated into all facets of our lives — from sensors in public trash cans to app-controlled Batmobiles — that the line between physical and virtual has begun to disappear.
No-one likes getting a bill they’re not expecting and that goes for IT managers too. Spiraling costs for storing data can be a constant headache, especially if you’re under budgetary pressure.
As businesses increasingly embrace digital transformation, it has become critical for CEOs to ensure their infrastructure investment supports the initiative. According to Gartner*, 47 percent of CEOs say they are being “challenged” by their board of directors to show progress in shifting toward a digital business model.
You think it will never happen to you. You assume your hard drive, server, network or perhaps your entire data centre is safe from unexpected outages. But when IT disaster strikes, it comes without warning, and can be in some bizarre forms.
According to the Agile Manifesto, customer collaboration goes beyond contract negotiation. You can use this principle to professionalise your service catalogue. But how do you go about doing so?
A topical Q&A with a leading light within the enterprise IT community, discover more about what Chris's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...
Back in 2015 on International Women’s Day, Former UN Director General Ban Ki Moon published a statement. “The world will never realise 100% of its goals if 50% of its people cannot realise their full potential,” he said. “When we unleash the power of women, we can secure a future for all.”
Oftentimes, it is said, we fight the last war. It happens when strategists fail to account for changes in the security environment, like the birth of the machine gun, the tank, or the improvised explosive device – technological innovations that altered how conflicts unfold.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Matthew's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...
SIEM technology has been in existence for more than a decade, providing consolidated security reports from correlated event logs, often in order to achieve compliance with security standards. But SIEM can do better, by leveraging correlated security events to trigger alerts and appropriate reaction from SOC (Security Operations Center) teams.
It is often thought that a computer’s central processing unit (CPU) handles everything within a computer. To some extent, this is true; however, CPUs have delegates per se. These delegates are referred to as chipsets and they have dedicated and specific tasks to carry out.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Sue's day to day consists of, why she chose IT as a career, how to be successful, and her predictions for the future...
At the start of a new year, it’s popular to opine on what the new year might bring in terms of technology advances. My predictions for the WAN in 2018 have been covered in several publications here, here and here. In this blog, I’m going to expand on one of my predictions.
Discussion of cyber threats is often focused purely on technical issues, but it is an organisation’s employees that can, ultimately, define the strength of its security.
With the introduction of the General Data Protection Regulation last May, the ability of any organisation to recover data in the event of a crisis has become much more of an issue.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Aidan's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...
For the last couple of years, Western Digital and 451 Research have taken a snapshot of the industry’s data challenges, by collecting the experience and opinions of real IT practitioners. This year they once again reached out to survey IT professionals to learn about current unstructured data trends.
The role of the CIO is changing dramatically, and expectations have never been greater. What was once central to the job — namely operating IT — has made way for the pursuit of digital transformation.
A topical Q&A with a leading light within the Cyber Security community, discover more about what Marc's day to day consists of, why he chose Cyber as a career, how to be successful, and his predictions for the future...
Recent research has predicted that women will represent more than 20 percent of the global cybersecurity workforce by the end of this year. While this is certainly an improvement from their representation in 2013 at 11 percent, it’s suffice to say that there’s still a lack of women in the industry.
Each year Martin Hingley of IT Candor makes a set of predictions for the IT and Communications (ITC) industry and this marks his 10th set of annual predictions.
No sooner have we accepted IoT than innovations are transforming how this hyperconnected world will be implemented. Among the emerging technologies is fog computing, which moves computing closer to the end-user to decrease latency and bandwidth overload while improving access.
Does the incredible rise of edge computing mean ‘death’ to enterprise data centres and the cloud?
Windows servers running Internet Information Services (IIS) are vulnerable to denial-of-service (DoS) attacks carried out through malicious HTTP/2 requests.
Test your enterprise IT pop culture knowledge, share your score with colleagues, and see if you could do with a visit to IP EXPO Manchester this April!
A topical Q&A with a leading light within the IT community, discover more about what Nicola's day to day consists of, why she chose IT as a career, how to be successful in IT, and her predictions for the future...
The way we consume services has changed significantly over the last decade but when it comes to the Wide Area Network (WAN), the architecture we use to deliver services to our branch users is often stuck back in the 90s.
The Internet of Things (IoT) is placing huge challenges on network managers across all industries. With booming endpoint numbers and generated traffic, device management and network efficiency become of paramount importance.
Jamie Graves from ZoneFox gives an insight into how we can use AI more effectively. It was standing room only when Jamie Graves of ZoneFox took to the stage at AI-Analytics X to discuss the strengths and weaknesses of AI.
The New Yorker calls Christopher Wylie “a pink-haired, nose-ringed oracle sent from the future." But he’s probably best known for his role in setting up – and then taking down – the cyber-warfare firm Cambridge Analytica!
In Graham Cluley's absolute belter of a session, we delve into the extraordinary, like the companies who pretend to be hacked when they haven’t, or the attackers who went to exceptional lengths to steal millions from their employers.
Anyone that’s been paying attention knows that fileless malware has been on the rise for the past few years. But, did you know that we’re likely to see this infamous threat transform in new and menacing ways this year? Enter the Vaporworm.
Today, cloud services providers (CSPs) are facing their own signs of aging. Discover the problems for maturing CSPs and their data centre operations.
There is growing pressure on IT to provide faster and more agile platforms for business, Red Hat’s James Allen discussed why those adopting open source tooling and practices are succeeding at the expense of those who don’t.
Researchers at the CenturyLink Threat Research Labs discovered that the operators of the TheMoon IoT botnet are offering it as a service.
By 2020 over 90% of companies will be utilising cloud services offered by multiple providers, using various orchestration tools. To ensure they retain full mobility and flexibility, businesses need to be wary of components which could potentially cause cloud lock-in.
Samantha Humphries, Senior Manager of Global Markets & Compliance at Rapid7 discusses SIEM myths, how to arm your Jedi (first responders), analytics and more. Discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today.
The events of annus horribilis 2008 changed the world forever. The change was dubbed the "New Normal" and in turn gave rise to shifts in economic and political power which would have been considered the stuff of fantasy fiction as 2008 came to a close.
People counting technology is regarded as one of the most effective ways to understand how a building functions throughout the working week. This kind of intelligence is invaluable for many businesses but none more so than support service providers looking to gain a more accurate way to deploy resource and make increasingly thin margins more profitable.
SD-WAN is now making its case. Allan Paton, Director of UK and Ireland at Silver Peak explores the evolution of SD-WAN and how it will replace the complexity of router-centric WAN architectures.
Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to bypass protections using zero-width spaces and deliver malicious messages to recipients.
Are British businesses firing employees unfairly as a result of possible data breach negligence? Ian Osborne, Vice President UK & Ireland at Shred-it, tackles this thorny issue.
In 2018, 11.2 billion devices worldwide are connected to the internet, and it is predicted that by 2020, a staggering 20.4 billion devices will be connected.
While everyone seems to be treating ‘artificial intelligence’ as the latest in-vogue topic, it’s important to remember it is far from a new development. It is not my intention to dilute the excitement of AI’s minefield of potential but, like anything that has the power to change the world, it requires an element of respect and a lot more know-how.
Malware researchers at Trend Micro have discovered a Powershell-based backdoor that is very similar to a malware used by MuddyWater APT group.
Ed Broking is a wholesale insurance and reinsurance broker, sourcing policies and coverage across a broad range of industries. Based in London, Ed Broking operates a number of international offices to support their global operations. Faced with replacing an ageing hosted server system, Ed Broking took the decision to move to fully hosted Microsoft Azure platform. This is their story.
The cloud is driving change in the media industry at an incredible rate, thanks to benefits achieved by its scalability and affordability. In an exclusive roundtable interview, industry experts debate the unique needs of the sector and outline strategies for success in the years ahead.
Security experts at Imperva reported an attack against Drupal Web servers running on Linux-based systems. Hackers exploited the Drupalgeddon2 flaw (CVE-2018-7600) along with other issues. The Drupalgeddon2 could be exploited to take over a website, it affects Drupal versions 6, 7 and 8.
BYOD is a thing of the past - or is it? Gary Cox, Technology Director for Infoblox in Western Europe, explores the troubling rise of Shadow IoT and how to detect it. With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices to enterprise networks, IT teams find themselves faced with greater complexity and more security issues than ever before.
Blockchain is more - much more - than Bitcoin. Jonathan Wilkins, Marketing Director at EU Automation explains how blockchain can automate a range of business processes. Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born in 1975, but there remains speculation about the inventor's true identity.
The survey, which was conducted at IP EXPO 2018, found that over a quarter (26 percent) of the IT professionals questioned selected “Give 110 percent” as their most frustrating office jargon of the year, followed by "Blue sky thinking" (19 percent), and "Low hanging fruit" (17 percent).
The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a local attacker to decrypt data.
Today, the user experience of digital services has the greatest impact on the perception of an organisation’s ability to operate competently and successfully in a digital world. It is the key competitive differentiator, and is essential for avoiding the risk of customer churn.
Whether or not you literally “own” the infrastructure, application or networks that deliver your apps and services, as an IT leader or technology professional you own the outcome. Here are five factors that you should consider to deliver an optimal user experience while using AWS.
The term cloud computing became popular somewhere halfway the first decade of this century, short before the launch of Amazon S3 and EC2. In the little over 10 years since, we have come a long way. However, I believe we still have to uncover the full potential of cloud computing. Although not part of the formal characteristics of cloud computing, there have been are two simmering expectation of cloud computing that we have failed to meet up to now.
The Challenge: Modern data centre's are changing rapidly. Thanks to virtualisation, more and more organisations are shifting to resilient, on-demand, private cloud environments, delivering applications faster and more cheaply than ever before. Software defined data centre's (SDDCs) are the new norm.
The warnings have been out there: Mobile and social accelerating customer interactions. Big data providing deep lakes of potential knowledge. Billions of connected gadgets bringing forth a global Internet of Things (IoT).
We think of Enterprise organisations as closed societies, working in isolation in pursuit of the advantage over their competitors. It might come as a surprise then to think about how much Open Source software is used within even the largest and most secretive companies around the world.
There is no need for data scientists to be outright software experts thanks to emerging tools for using data delivered through the cloud. Making use of the cloud as a shared platform ensures the delivery of the right data to the right people at the right time, without the inefficiency of workflows passing through many hands through hand-overs.
Serverless is an emerging “new normal” for web-based applications and services where the unit of deployment and billing is a single function a few lines of code in length. Serverless enables radical transparency in billing and radical ease of use for developers; when combined with with marketplace (“app store”) offerings from cloud vendors like AWS.
Due to its cryptographic background, a common perception is that blockchain is inherently secure. But blockchain is not un-hackable or hidden from potential manipulation.
Smart homes and smart cities will likely be top of mind in conversations around the Internet of Things (IoT), but the application of IoT is becoming far more widespread than these two areas as a growing number of industries adopt IoT devices.
With the soaring number of mobile and IoT devices, and the onslaught of new apps that businesses are faced with on their wireless network, it is time for innovation that can help IT scale and meet these new requirements.
Our recent research uncovered that just over a third of Brits (35%) would not trust an organisation using blockchain technology to keep their information secure. But with so many uses beyond recording cryptocurrency transactions, we think people need to wake up to the real potential for blockchain. Here are five of the most interesting use cases for blockchain from the last year.
AI and robotics are going to create almost 60 million more jobs globally, that’s according to a new report from the World Economic Forum. The Swiss think tank released its Future of Jobs report to put facts behind the much-debated topic of AI and job displacement.
Today the world faces one of its most daunting, but also exciting tasks - how organisations will transition into the future with Artificial Intelligence entering the workplace. However we look at it, AI directly threatens a large portion of the global workforce whose jobs will be competing with digitisation, automation, and continuously improving AI.
With the explosion of cryptocurrency over the past of years, many have been debating the longevity and legitimacy of cryptocurrencies in our global economy. However, those with a keener eye were fascinated with something far more useful and widely applicable: Blockchain — the technology that made cryptocurrency possible in the first place.
Cybercriminals have never been so notorious. As technology innovation seems to outpace security defenses, organizations are turning to ethical-hackers to assess risk and see where they are most vulnerable.
Dr Greg Benson, Professor of Computer Science at the University of San Francisco and Chief Scientist at SnapLogic, shares his tips for hiring the best AI talent and a what it means to work across both industry and academia for AI development.
Stegware, the weaponisation of steganography by cyber attackers, is on the rise. Find out why this is bad news for IT professionals.
In a world of sensitive data and tightening regulations, discover what you should do as an organisation!
On any given day AI is both the saviour and the doom of human kind. Opinion on the technology can change as quickly as the wind. But behind the curtain of doubt AI programs are already making incredible benefits to our lives, often without us even realising.
Troublesome political climate has put the NHS, like many other Public-Sector organisations, under immense pressure to cut costs and drive operational efficiencies whilst simultaneously embracing new digital methods, in a bid to improve services. As a result, proper and necessary data security controls have not yet been totally embraced…
From ransomware and exploding power plants to AI and identity theft - new survey from IP EXPO Manchester uncovers the cyber fears of the UK.