Industry Insight


Feature Article

Digital transformation insights report - May 2020
Digital transformation insights report - May 2020

Findings and insights from a survey of hundreds of business about their considerations and challenges around digital transformation in a post-COVID era

UC EXPO Announces Online Event to Roadmap the Future of Work and Collaboration: UCX Digital
UC EXPO Announces Online Event to Roadmap the Future of Work and Collaboration: UCX Digital

UC EXPO, Europe’s most extensive unified communications and collaboration (UC&C) event, has today announced that it will be hosting UCX Digital - it’s first ever online event - on Wednesday 10 - Thursday 11 June. The online event will complement the rescheduled live event which will take place 30 Sept- 1 Oct alongside Digital Transformation EXPO Europe.

How to run a top-level security operation without breaking the bank
How to run a top-level security operation without breaking the bank

With over 20 years’ experience defining strategies for security products and technologies and helping organisations recover and learn from cyberattacks, Sam Humphries, Security Strategist at Exabeam, knows what it takes to build a security battle squad. In this interview, she debunks the assumption that increased capabilities has to equate to increased cost, offering advice on how to make use of automation, techniques to select the right tool for the task and why you need to focus on people and processes.

After COVID, what’s the next big tech risk you won’t anticipate?
After COVID, what’s the next big tech risk you won’t anticipate?

We think it’s climate change and here’s why....

What will the workplace of the future look like?
What will the workplace of the future look like?

What will this look like? Will there be any offices at all? What about employee health and wellbeing? And where will all of that money spent on expensive property go?

How to balance long-term resilience and short-term threat prevention
How to balance long-term resilience and short-term threat prevention

With the mass adoption of home working technology and increased activity on both online services and customer-facing networks, cyber attackers have a wealth of openings to exploit.

5 Times More Coronavirus-themed Malware Reports during March
5 Times More Coronavirus-themed Malware Reports during March

As the Coronavirus pandemic continues, cybercriminals have started piggybacking news of the crisis to deliver malware, conduct phishing, and even perform online fraud by preying on the panic caused by a dearth of medical supplies and reliable information about the pandemic.

Working from Home Now? Here’s How to Do it Securely
Working from Home Now? Here’s How to Do it Securely

While remote employees battle cabin fever, their employers wrestle with bigger challenges. Home networks provide hackers a treasure trove of PII before employees connect a single smart phone or laptop, find out how you can WFH securely. 

Maintaining Productivity While Managing a Mobile Workforce
Maintaining Productivity While Managing a Mobile Workforce

Some industries – like those employing field engineers or on-site consultants – have no choice but to support mobile working. Others still have a choice about providing remote working, but possibly not at the moment.

Coronavirus & Home Working; How to build your IT continuity plan
Coronavirus & Home Working; How to build your IT continuity plan

To help Directors, Managers and IT departments alike, we have detailed a simple approach to business impact assessment, plan and implement, alongside a Top 7 checklist on getting your IT right. 

Coronavirus now possibly largest-ever cyber security threat
Coronavirus now possibly largest-ever cyber security threat

The total volume of phishing emails and other security threats relating to the Covid-19 coronavirus now represents the largest coalescing of cyber-attack types around a single theme that has been seen in a long time, and possibly ever. 

Take a Reactive Approach to Knowledge Management
Take a Reactive Approach to Knowledge Management
Service desks are being told left, right, and centre to be proactive in their approach to service delivery, but it’s time to take a step back and ask the question: Is being proactive right for knowledge management?
Defeat Cryptojacking Malware with Responsive Automation
Defeat Cryptojacking Malware with Responsive Automation

Responsive automation makes it possible to shorten time to detection and accelerate response by automating processes that typically require a skilled security analyst. For my money, there are few better examples of the value of responsive automation than the threat of cryptojacking malware.

To the DTX Manchester Tech community
To the DTX Manchester Tech community

Important announcement for everyone interested in attending Digital Transformation EXPO Manchester 2020!

Centre stage with Bob Poole, DevOps Manager at Wejo Ltd
Centre stage with Bob Poole, DevOps Manager at Wejo Ltd

A topical Q&A with a leading light within the IT community, discover more about what Bob's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

DX Stories: The Virtual Engineering Centre introduces Augmented Reality Technology to SME manufacturer to improve customer experiences
DX Stories: The Virtual Engineering Centre introduces Augmented Reality Technology to SME manufacturer to improve customer experiences

Openhouse wanted to explore the potential of virtual prototyping and the application of augmented reality (AR) as a way of customising its products and enhancing customer interaction.

5 Tips for Selecting a Network Management Solution
5 Tips for Selecting a Network Management Solution

If it were possible to never again shop for new enterprise software, there would be sighs of relief from nearly every CIO, data centre manager, and network administrator around the globe—at least from anyone who has been through the process before.

Cybersecurity: combating “inside attacks”
Cybersecurity: combating “inside attacks”

With increasingly sophisticated cyber-security systems, companies will have to take greater measures to ensure that their workforce is as secure and guarded against threats as their systems.

Centre stage with Hanna Karppi, Digital Workplace Manager at Sigma IT
Centre stage with Hanna Karppi, Digital Workplace Manager at Sigma IT

A topical Q&A with a leading light within the IT community, discover more about what Hanna's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...

Cybersecurity in a 5G World, What You Should Know
Cybersecurity in a 5G World, What You Should Know

These days, it seems that all people can talk about is 5G technology and how it will change the world. For those that don’t really quite understand the magnitude of what 5G means, then you’ve come to the right place.

Seven Tips for Better Cloud Security in 2020
Seven Tips for Better Cloud Security in 2020

Cloud security is a pressing challenge for many organisations. While there are clear business incentives for moving applications and workloads into the cloud, there are also serious risks that companies must manage when doing so.

Centre stage with Antonio Cobo, Delivery Manager at BJSS
Centre stage with Antonio Cobo, Delivery Manager at BJSS

A topical Q&A with a leading light within the IT community, discover more about what Antonio's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

Manchester’s Digital Revolution!
Manchester’s Digital Revolution!

According to a report by CBRE, Manchester remains the number one tech location outside of London. This is pleasing news for a region that is seeking to establish itself as a leading European, or even global tech hub.

DX Stories: InsightVM Provides Visibility and Control to Keep Staff and Students Safe at Manchester Metropolitan University
DX Stories: InsightVM Provides Visibility and Control to Keep Staff and Students Safe at Manchester Metropolitan University

Manchester Metropolitan University (MMU) is one of the five largest further education institutions in the UK, situated in the country’s most popular student city. With two sites, 38,000 students, and 3,000 staff members to manage, there’s plenty to keep network security engineer Steven Fitzsimmons and his team of three busy.

The Brainwaive
The Brainwaive

In her session at Digital Transformation EXPO Europe, Hannah took the audience on a tour of the key questions at the cutting edge of AI and she explored some of the challenges of building a human-made mind.

Centre stage with Tom Liptrot, Freelance Data Science Consultant at Ortom
Centre stage with Tom Liptrot, Freelance Data Science Consultant at Ortom

A topical Q&A with a leading light within the IT community, discover more about what Tom's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

Cloud misconfiguration and you
Cloud misconfiguration and you

It is often believed that by using the public cloud, security is someone else’s job. This couldn’t be more wrong. The first thing you must understand when building or migrating to the cloud is the shared responsibility model.

Head in the clouds
Head in the clouds

Is cloud computing not a bit old hat now, with banks benefitting from widescale adoption across their business lines? And given the dramatic quarterly jump in earnings for both AWS and Microsoft Azure in Q4 2018 (45% and 76% respectively), shouldn’t we expect that banks across the UK and globally have contributed substantially to this rapid growth?

Facebook fixed a WhatsApp bug that allowed hackers to access local file system
Facebook fixed a WhatsApp bug that allowed hackers to access local file system

Facebook addressed a critical issue in WhatsApp that would have allowed attackers to read files from a user’s local file system, on macOS and Windows.

Centre stage with Marco Rottigni, Chief Technical Security Officer EMEA at Qualys
Centre stage with Marco Rottigni, Chief Technical Security Officer EMEA at Qualys

A topical Q&A with a leading light within the IT community, discover more about what Marco's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

DX Stories: Policy Services Protects Physical Servers and Office 365 with Druva Cloud Platform
DX Stories: Policy Services Protects Physical Servers and Office 365 with Druva Cloud Platform

Policy Services needed to enable advisers and clients to access their policies via a web portal, meaning we must make sure that 3.5 terabytes of data is safe, backed up, and recoverable should disaster strike. 

Centre stage with Paige Roberts, Open Source Relations Manager at Vertica.
Centre stage with Paige Roberts, Open Source Relations Manager at Vertica.

A topical Q&A with a leading light within the IT community, discover more about what Paige's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...

Cloud IaaS and PaaS - how do the main vendors stack up?
Cloud IaaS and PaaS - how do the main vendors stack up?

Customers care most about uptime, security and costs according to Computing's research

Why employees can be the biggest headache when transitioning to the cloud
Why employees can be the biggest headache when transitioning to the cloud

A business setting up today wouldn’t start by building a data centre to serve deskbound employees. They would opt for cloud computing and enable flexible working from day one.

Webinar: How can you protect and backup your Office 365 Data?
Webinar: How can you protect and backup your Office 365 Data?

While O365 is fast becoming the centre of business productivity, a backup and recovery strategy is just an afterthought. Six of the 10 O365 users that IDC spoke with do not have a data protection plan for their O365 estates or rely on Microsoft's native capabilities.

DX Stories: Driving efficiency for med-tech providers through NICE’s HealthTech Connect platform
DX Stories: Driving efficiency for med-tech providers through NICE’s HealthTech Connect platform

Using a GDS-aligned agile approach, Sigma collaborated with NICE to help implement their national horizon scanning system, HealthTech Connect; a platform that identifies transformative medical technologies, with potential economic and patient care benefits.

Migrating to the Cloud with Speed and Resiliency
Migrating to the Cloud with Speed and Resiliency

In our change-driven economy, most CIOs are under pressure to deliver more with less - and to deliver it faster than ever before. Migrating applications to the Cloud seems like a way to easily deliver more for less - on the surface...

DX Stories: The Keyholding Company – Digital Transformation - Full systems replacement
DX Stories: The Keyholding Company – Digital Transformation - Full systems replacement

The Keyholding Company wanted to build an enterprise IT system that would handle all aspects of day to day operations and provide a platform to enable the next stage in The Keyholding Company’s evolution.

What lies on the horizon for AI in 2020?
What lies on the horizon for AI in 2020?

The pace of innovation in this space means that AI adoption and integration has been seen across a significant number of industries and has created solutions to long-standing problems. Yet still today, there are still businesses who are not leveraging AI to their full advantage.

Five Tips for Choosing the Right Unified Communications Platform
Five Tips for Choosing the Right Unified Communications Platform

Unified communications (UC) should help your business save money, increase efficiency and create a better experience for customers and employees. But these benefits are only possible if you consider these five factors during your consideration process:

AWS vs Azure: Choosing between cloud’s big beasts
AWS vs Azure: Choosing between cloud’s big beasts

The public cloud jungle is dominated by two really big beasts: Amazon AWS and Microsoft Azure. But how do their IaaS/PaaS services differ, and what’s to choose between them?

From Flash to Cloud – The New Data Centre Architecture
From Flash to Cloud – The New Data Centre Architecture

Many enterprises are adopting a flash to cloud architecture to achieve a fast and cost-efficient IT environment. Here’s what this architecture looks like and what applications benefit most from this approach.

Is it time for cloud disaster recovery?
Is it time for cloud disaster recovery?

Disaster recovery remains ever present in the minds of IT. As we enter 2020 the challenges facing IT professionals as they establish a disaster recovery plan are more daunting than ever.

TikToks banned by the Army, but is it safe?
TikToks banned by the Army, but is it safe?

As reported by Military.com, the US Army recently banned the app TikTok from use on phones. “It is considered a cyber-threat,” Lt. Col. Robin Ochoa, a spokeswoman for the Army said in the Military.com article.

RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data
RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data

Bitdefender researchers recently found threat actors abusing a legitimate feature in the RDP service to act as a fileless attack technique. 

Keeping your cool
Keeping your cool

Choosing and operating data centre cooling equipment is a daunting task for the non-expert. Find out what you should consider before acting.

DX Stories: How We’re Making Whole Genome Sequencing in Patient Care a Reality
DX Stories: How We’re Making Whole Genome Sequencing in Patient Care a Reality

All of us who are entrepreneurs see a better way to do something, or a better way to solve a problem. When we initially architected ActiveScale™, we knew that data is growing at incredible rates and that petascale solutions are going to be key to unlocking the possibilities of data.

Retaining your talent by waving them goodbye
Retaining your talent by waving them goodbye

It happens. Your best database specialist decides to leave. Or the one service desk employee all your customers love. How do you respond? Are you happy for them? Or disappointed?

SD-WAN and IoT: a perfect partnership
SD-WAN and IoT: a perfect partnership

Cost-effective, secure, and manageable connectivity is the foundation of IoT adoption, but as IDC reports, traditional WANs are too costly and complex to support the new apps and IoT devices popping up at remote business sites.

4 signs that it’s time for a server upgrade — and what to look for
4 signs that it’s time for a server upgrade — and what to look for

We’ve looked at four of the most common reasons businesses need to upgrade their servers—and identified exactly which capabilities your new servers should have to make a real difference for your business.

Cloud: Choosing The Right Platform for Your Ambitions
Cloud: Choosing The Right Platform for Your Ambitions

Cloud is going only one way: upwards. Analysts such as Gartner, Forrester and IDC are united in the opinion that cloud IaaS and PaaS will keep on growing at double-digit rates for the next three years. 

Minimising Risk: Top 5 Challenges in Data Centre Migration
Minimising Risk: Top 5 Challenges in Data Centre Migration

Organisations are at their most vulnerable during key IT transitions, like data centre migrations. In fact, data centre migration is one of the most critical and complicated IT transitions you’ll face today.

5 Ways UCaaS Makes Your Job Easier
5 Ways UCaaS Makes Your Job Easier

Not only does UCaaS provide businesses with the combination of critical connectivity solutions they need in one cohesive environment, but it also simplifies the management of that communication stack too.

In IT Security: Never Trust, Always Verify
In IT Security: Never Trust, Always Verify

It used to be that firewalls were a good guarantee of safety. However, a string of high-profile cyber-attacks has ushered in the wave of ‘zero trust’ firewall architectures.

Why should your business invest in data analytics?
Why should your business invest in data analytics?

Data has increased in volume but has also gained richness and diversity - here's how businesses can benefit.

Creating your team: do you choose personality over skills?
Creating your team: do you choose personality over skills?

Hiring the right people is essential for creating a successful organisation. But how do you hire the right people? When recruiting new colleagues, it’s essential to focus on their personality, not just their skills.

Webinar: Applying Intelligent Automation to radically transform your business
Webinar: Applying Intelligent Automation to radically transform your business

This webinar will explore the practical steps towards meeting your organisations challenges by the adoption of Intelligent Automation. 

4 ways for SMEs to boost workplace collaboration and increase productivity
4 ways for SMEs to boost workplace collaboration and increase productivity

We’re experiencing an ongoing shift in how we work and where we work largely driven by technological advances allowing us to automate more, work more efficiently, and communicate more easily.

The changing face of HR systems
The changing face of HR systems

For many years, human resources systems (also known as human resource information systems HRIS, or human capital management HCM) were something of an IT backwater, with companies commonly keeping systems in place for 20 years or more.

Five steps to build a successful enterprise application strategy
Five steps to build a successful enterprise application strategy

CIOs everywhere want to create a more digital workplace — one that reinforces that IT is a strategic business partner, a function that creates opportunity for the business. And one that streamlines the IT environment, reducing complexity and improving the experience for end users.

The Journey to Turnkey Network Security Virtualisation
The Journey to Turnkey Network Security Virtualisation

While performing a crucial role in preventing successful cyberattacks, firewalls have evolved over several generations to become much more than packet-filtering mechanisms.

Keeping Data Safe in the Cloud – the Essential Checklist
Keeping Data Safe in the Cloud – the Essential Checklist

Protecting customer data is, quite rightly, a significant concern for companies: new research has found that 54% worry most about the security of payment information and 49% about customer information, largely due to data sensitivity and the need to comply with privacy regulations.

Paying it forward
Paying it forward

Cloud and artificial intelligence technologies are enabling seamless, secure and transparent payment services to meet the demands of a hyper-connected world.

The Power of Communications Data to Drive Employee Productivity and Customer Engagement
The Power of Communications Data to Drive Employee Productivity and Customer Engagement

This webinar will explore how gathering insights from communications data can increase productivity and give rise to greater operational efficiencies within organisations.

Data is Growing Faster than Storage Budgets Can Keep Up
Data is Growing Faster than Storage Budgets Can Keep Up

For businesses surveyed by the 451 Alliance, total data under management increased more than 20% on average over the past year, and is expected to rise even faster over the next 12 months.

The impact of cloud-native disaster recovery
The impact of cloud-native disaster recovery

Enterprises continue to turn to the cloud for backing up data and hosting virtual machines. Once in the cloud, however, virtual machines still need to be protected. After all, accidents can happen in the cloud, too. 

Access Denied, Just-In-Time: Protecting your organisation from internal threats
Access Denied, Just-In-Time: Protecting your organisation from internal threats

It’s evident that the insider threat can be difficult to catch because employees have legitimate access to the network. Plus, BYOD and the cloud have made the traditional network perimeter obsolete. 

Microsoft and Salesforce battle to control UK CRM
Microsoft and Salesforce battle to control UK CRM

Microsoft and Salesforce dominate the UK CRM market, with their awareness, trialling and adoption far ahead of any competitor, according to Delta's report in the CRM space.

Location doesn’t build culture, the team does
Location doesn’t build culture, the team does

A misconception has permeated workforces for years that an organisation’s location is the primary driver of its culture. Under this line of thinking, employees must work from the same place at all times to build a cohesive culture.

Centre stage with Galina Alperovich, Senior Researcher at Avast
Centre stage with Galina Alperovich, Senior Researcher at Avast

A topical Q&A with a leading light within the IT community, discover more about what Galina's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...

Ethical AI: Why Pure is spearheading industry wide debate and collaboration at DTX Europe
Ethical AI: Why Pure is spearheading industry wide debate and collaboration at DTX Europe

Artificial Intelligence is revolutionising how businesses use data; specifically delivering faster and more accurate insights, increasing productivity, and creating new revenue streams. However

Why Virtualizing Network Security is the Future
Why Virtualizing Network Security is the Future

With the exponential increase in traffic demands and the high encryption rates for that traffic, enterprises face an ever-expanding threat surface when it comes to cybersecurity. We have an unacceptable blind spot in network security called the SSL inspection gap. 

Remediating Misconfigurations to Keep Your Cloud Out of the News
Remediating Misconfigurations to Keep Your Cloud Out of the News

An organisation that is transitioning to a cloud provider such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) should immediately consider a shift towards a new model of security, namely continuous control and enforcement of secure configuration of cloud services.

Centre stage with Aleksander Gorkowienko, Managing Consultant, Spirent Communications
Centre stage with Aleksander Gorkowienko, Managing Consultant, Spirent Communications

A topical Q&A with a leading light within the IT community, discover more about what Aleksander's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

The Top Five Reasons Why Organisations Are Adopting SD-WAN
The Top Five Reasons Why Organisations Are Adopting SD-WAN

In order to keep pace with emerging market trends, fluctuating customer demands, and increased competition, many of today’s organisations are embracing digital transformation. However, digitally transforming is no easy feat.

How enterprises can stay at the cutting edge of business
How enterprises can stay at the cutting edge of business

With tools such as Microsoft Teams underpinned by solutions including the Azure Cloud, Dynamics and the Power Platform, the Microsoft ecosystem is ensuring that pioneering enterprises can stay at the cutting edge of business.

AI Ethics Board Live: The risks and rewards to businesses, how can you get it right?
AI Ethics Board Live: The risks and rewards to businesses, how can you get it right?

Artificial Intelligence is not just a buzzword. It’s a game-changer with the potential to revolutionise industries big and small, and enable new innovation and discoveries across every sector.

How the cloud lowers your TCO
How the cloud lowers your TCO

Combining the security capabilities of first-tier cloud service providers with a sophisticated cloud-native SaaS app minimises attack vectors as well as speeds recovery times. But there’s another benefit everyone will understand: lower costs.

What to Look for in Cloud MSPs
What to Look for in Cloud MSPs

According to a research study conducted with the 451 Alliance, organisations’ reliance on cloud is growing.

Centre stage with Donnie MacColl, Director Technical Services EMEA at HelpSystems
Centre stage with Donnie MacColl, Director Technical Services EMEA at HelpSystems

A topical Q&A with a leading light within the IT community, discover more about what Donnie's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

Five mistakes that turn corporate security awareness into a waste of money
Five mistakes that turn corporate security awareness into a waste of money

More than half of businesses consider their employees to be the weakest link in corporate cybersecurity, as their actions may put company data and systems at risk. That’s why companies invest heavily in educating them on basic IT security skills.

The Delta Difference
The Delta Difference

When it comes to acquiring new technology, every business follows the same path, whether it is an SME or an international giant. Time-consuming market research is one of the first steps in the process, where tens or hundreds of companies and solutions are compared against one another – complicated all the more by a lack of impartial information.

Centre stage with Emma Button, Co-Founder at nubeGo
Centre stage with Emma Button, Co-Founder at nubeGo

A topical Q&A with a leading light within the IT community, discover more about what Emma's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...

VPS vs dedicated server: what’s the difference and why does it matter?
VPS vs dedicated server: what’s the difference and why does it matter?

With Digital Transformation EXPO Europe on the horizon, you may be in the market for a platform to host your latest online projects. When it comes to getting the most in terms of control and configuration, you essentially have two options: a virtual private server (VPS) or a dedicated server.

Achieving Digital Transformation: How Starting with RPA Brings Success
Achieving Digital Transformation: How Starting with RPA Brings Success

Conversations about digital transformation are happening every day all around the world. No matter what industry you’re in, you’ll find efforts to bring digital tools into the mix to transform the way companies work.

Centre stage with Al Taylor Co-founder & CTO of cloudDNA…
Centre stage with Al Taylor Co-founder & CTO of cloudDNA…

A topical Q&A with a leading light within the IT community, discover more about what Al's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

Data Science today! - Independent research from DTX
Data Science today! - Independent research from DTX

Challenges, Opportunities, and Real World Insights from UK Data Scientists - Back in 2017, The Economist1 printed an article that suggested the world’s most valuable resource was no longer oil, but data.

Centre stage with Lisa Forte Partner at Red Goat Cyber Security…
Centre stage with Lisa Forte Partner at Red Goat Cyber Security…

A topical Q&A with a leading light within the IT community, discover more about what Lisa's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...

Want an agile service desk? Forget about Scrum, start using Kanban
Want an agile service desk? Forget about Scrum, start using Kanban

When you think of agile working methods, Scrum is one that quickly comes to mind. But while Scrum works great for implementing changes and projects, it has a far from perfect success rate in service desk environments. Instead, try Kanban – an agile method that is much more suited towards service desks.

Who is your biggest threat in this war against cyber-crime?
Who is your biggest threat in this war against cyber-crime?

Jennie Williams gave an insight into some of the top tips businesses, small and large, should consider to protect themselves against the increasingly sophisticated cyber-attacks.

Webinar: Cloud communications made easy - 8 difficult questions to ask!
Webinar: Cloud communications made easy - 8 difficult questions to ask!

Cloud communications offer clear advantages over traditional PBX telephony systems but to get the right solution for your organisations it’s essential to look beyond features and functionality.

Is Your Business AI-Ready?
Is Your Business AI-Ready?

As legacy systems have struggled to meet the speed expected by the modern customer, the introduction of artificial intelligence (AI) into the contact centre has allowed customer service departments to regain the upper hand.

Applying Machine Learning to Network Centric Security
Applying Machine Learning to Network Centric Security

Despite increased cybersecurity budgets and complex security architectures, most organisations still struggle to maintain the right level of threat visibility and the ability to detect advanced attacks.

Centre stage with Jake Moore Cyber Security Specialist for ESET…
Centre stage with Jake Moore Cyber Security Specialist for ESET…

A topical Q&A with a leading light within the IT community, discover more about what Jake's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

SD-WAN: a new approach to networking
SD-WAN: a new approach to networking

As businesses become more reliant on software applications, the enterprise networking environment is becoming increasingly challenging. Cloud-based applications require greater flexibility, agility, and scalability from underlying networks.

Using advanced technology to drive results
Using advanced technology to drive results

Changes driven by technology have drastically altered perceptions and expectations of both the “work experience” and the “customer experience” bringing us to the cusp of new experiences, supported by new and emerging technologies.

Centre stage with Anthony Bartolo, Sr. Cloud Advocate at Microsoft…
Centre stage with Anthony Bartolo, Sr. Cloud Advocate at Microsoft…

A topical Q&A with a leading light within the IT community, discover more about what Anthony's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

DTX Europe 2019 Quiz
DTX Europe 2019 Quiz

Test your enterprise IT pop culture knowledge, share your score with colleagues, and see if you could do with a visit to Digital Transformation EXPO Europe this October!

Centre stage with Rik Ferguson, VP Security Research at Trend Micro...
Centre stage with Rik Ferguson, VP Security Research at Trend Micro...

A topical Q&A with a leading light within the IT community, discover more about what Rik's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

Feeding the GPU Beast – How to Leverage NVMe™ for AI & ML
Feeding the GPU Beast – How to Leverage NVMe™ for AI & ML

In today’s digitised world, industry leaders are more effective in every aspect of data analytics; they run state-of-the-art analytics applications powered by GPU’s and high-performance storage infrastructures to capture, store and analyse more data faster and make better business decisions.

10 Things You Need to Know About Hybrid Cloud
10 Things You Need to Know About Hybrid Cloud
Centre stage with Jeff Williams, CTO and Co-Founder of Contrast Security...
Centre stage with Jeff Williams, CTO and Co-Founder of Contrast Security...

A topical Q&A with a leading light within the IT community, discover more about what Jeff's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...

Five Steps That IT Directors Take to Avoid IT Issues
Five Steps That IT Directors Take to Avoid IT Issues

Tech is the engine that keeps many companies running, yet business executives don’t think about it until their email stops working. Conversely, the IT director thinks about IT all the time to ensure that it stays up operational.

Signs You’ve Been Hacked!
Signs You’ve Been Hacked!

What if we set aside elaborate graphical messages and assume malware authors did some degree of masking malicious infections, what would you look for? What are some common signs of infection? This post will cover just that – and based on a real-world example that I’ve been informed about personally!

Enabling Maximum Productivity and Employee Engagement with Unified Communications
Enabling Maximum Productivity and Employee Engagement with Unified Communications

June 2019 saw the publication of our most recent research project, the Fuze Communications Index, which incorporates global usage data reflecting engagement with the Fuze platform across 14 countries.

Applying AI to save lives: How did Microsoft make drones self-aware?
Applying AI to save lives: How did Microsoft make drones self-aware?

Drone use has increased dramatically, but imagine if they were self-aware and smart? What could they do for businesses and how could they save lives?

What does Shift Left mean for ITSM?
What does Shift Left mean for ITSM?

Shift Left as a trend keeps on growing in the industry, and as a company focused on service excellence and end user empowerment, we couldn't be happier. But why is Shift Left still gaining momentum?

Six Principles for Securing Sensitive Enterprise Content in a Hyper-Connected World
Six Principles for Securing Sensitive Enterprise Content in a Hyper-Connected World

To succeed in today’s hyper-connected world, businesses, governments and NGOs must enable easy online collaboration across the extended enterprise.

Digital Transformation Supplement in the Times
Digital Transformation Supplement in the Times

The Digital Transformation special report, published in The Times looks at why many organisations remain in the dark about what “digital transformation” really means for them and why it has been long considered crucial for any business.

Techerati: Cloud Gaming and The Role of Data Centres
Techerati: Cloud Gaming and The Role of Data Centres

What part will data centres have to play in the rollout of cloud gaming platforms such as Google Stadia?

Intel addresses high severity flaw in Processor Diagnostic Tool
Intel addresses high severity flaw in Processor Diagnostic Tool

Intel’s Patch Tuesday security updates for July 2019 address a serious flaw in the Processor Diagnostic Tool and another issue in the Solid State Drives (SSD) for Data Centres (DC).

Cloud Guidepost: Common configuration mistakes for Cloud Connectors
Cloud Guidepost: Common configuration mistakes for Cloud Connectors

Citrix Cloud is a revolutionary way to deliver Citrix products by offloading the control plane and providing companies with one of the fastest ways to deploy Citrix into a production-ready environment.

Adware-Packed Fake Apps Still Making Their Way to Google Play
Adware-Packed Fake Apps Still Making Their Way to Google Play

Adware is nothing new, nor will it go away any time soon, especially since it’s a legitimate means for app developers to generate revenue.

How enterprises can use Unified Communications to tackle the challenges of the future
How enterprises can use Unified Communications to tackle the challenges of the future

As we get ready to enter a new decade, businesses large and small face a long list of strategic challenges – and technology will play a vital role in meeting them, particularly when it comes to communications infrastructure.

Ruby’s strong_password Gem Backdoored
Ruby’s strong_password Gem Backdoored

With new software releases and developments, often times you’ll also see a changelog of some sort. Changelogs describe alterations new releases contain compared to prior versions. Reviewing these changelogs is important for many reasons.

Understanding the Incident Priority Matrix
Understanding the Incident Priority Matrix

The tickets keep rolling in and they are all over the place. Of course, the blocked printer on floor 7 takes a back seat if all of the company’s internet is under attack by outage monsters. However, situations are rarely that clear-cut. How do you prioritise incidents on a detailed level?

Protect your DNS, protect your data
Protect your DNS, protect your data

For the past four years, the DNS Global Threat Report created from Coleman Parkes survey data explored the technical causes and behavioural responses of Domain Name System (DNS) threats and their potential effects on businesses globally.

Public Sector Technology Trends
Public Sector Technology Trends

Technology has the power to transform virtually any industry when it’s used correctly. In the UK at the moment, the public sector seems to need this innovation more than ever, to help overcome everything from skills shortages, to overwhelming uncertainty caused by the impending departure from the EU.

Top Cyber Attacks of 2019
Top Cyber Attacks of 2019

As we’ve officially made it through the first six months of 2019, we’re pausing to round up some of the largest cyber-attacks that have occurred so far this year.

Using Kubernetes CRDs for rewrite and responder policy configuration
Using Kubernetes CRDs for rewrite and responder policy configuration

You can now power your Kubernetes platform by auto-deploying policy configurations for redirect and rewrite features like redirecting HTTP traffic, blocking URLs, or responding to a request that requires policy evaluation.

IT issues cost companies £3.4 billion per year in lost productivity
IT issues cost companies £3.4 billion per year in lost productivity

Many UK businesses are losing out both financially and on productivity levels due to their workplace IT systems, new research has revealed.

Will Data Centres Go the Way of the Dinosaurs?
Will Data Centres Go the Way of the Dinosaurs?

Ten years ago, being in charge of a large enterprise IT operation meant you were also in the real estate business, operating one or more climate-controlled facilities with raised floors and lots of server racks.

Microsoft warns of spam campaign exploiting CVE-2017-11882 flaw
Microsoft warns of spam campaign exploiting CVE-2017-11882 flaw

Microsoft is warning of an active spam campaign targeting European languages that leverages an exploit to infect simply by opening the attachment.

2019 Trends as seen by Jack Bedell-Pearce, MD at 4D Data Centres
2019 Trends as seen by Jack Bedell-Pearce, MD at 4D Data Centres

Jack Bedell-Pearce, Managing Director at 4D Data Centres, considers the remaining opportunities, threats, and challenges businesses will face in the second half of this year, sharing some advice along the way.

6 ways to improve your Service Desk customer service
6 ways to improve your Service Desk customer service

Customer experience is increasingly important to the modern service desk. Luckily, there are a lot of ways to make sure that your service delivery always meets your customer's demands. These are some of our favourites.

Simplifying Cloud Networking with Microsoft Azure
Simplifying Cloud Networking with Microsoft Azure

As enterprises continue to rapidly migrate applications and infrastructure to the cloud, SD-WAN technologies are quickly gaining traction.

An APT Blueprint: Gaining New Visibility into Financial Threats
An APT Blueprint: Gaining New Visibility into Financial Threats

This new Bitdefender forensic investigation reveals a complete attack timeline and behaviour of a notorious financial cybercriminal group, known as Carbanak.

9 steps to map a customer journey for your service desk
9 steps to map a customer journey for your service desk

So, you’re ready to improve your services. Making a customer journey sounds like a plan, but what’s the goal of customer journey mapping? And once you’ve decided it’s the right approach for your service desk, how do you create customer journeys for your services?

Some Security Tips as Spring Cleaning Season Starts to Close
Some Security Tips as Spring Cleaning Season Starts to Close

Spring cleaning season has almost finished and summer is almost here, if you haven’t gotten around to giving your network a good spring cleaning yet, it’s never too late to step back and sweep out the cobwebs to improve your security posture.

Fit for the future: 3 key things to know about modernising your SAN
Fit for the future: 3 key things to know about modernising your SAN

Digital transformation is shaking up the way companies do business. One key outcome is the focus on new ways to unlock value from existing data, even whilst embracing next-gen social, mobile, cloud, and analytics technologies. 

The 7 Rs of the application landscape
The 7 Rs of the application landscape

In a recent blog post, I gave some insight into some of the fascinating customer-facing work we do inside the Office of the CTO at Citrix and, at the same time, introduced eight of the most commonly observed shifting dynamics that are on the minds of today’s CIOs and CTOs.

Built environment (bE): why modular uninterruptible power supplies are the answer to Ireland’s data centre dilemma
Built environment (bE): why modular uninterruptible power supplies are the answer to Ireland’s data centre dilemma

With Dublin overtaking London as Europe’s largest data centre cluster, modular uninterruptible power supplies are key to powering this processing revolution.

New MegaCortex Ransomware targets enterprise networks
New MegaCortex Ransomware targets enterprise networks

Experts at security firm Sophos discovered a new strain of ransomware dubbed MegaCortex that is targeting corporate networks.

De-Mystifying Security: Compliance and Regulation
De-Mystifying Security: Compliance and Regulation

The General Data Protection Regulation (GDPR), effective from 25 May 2018, enhances existing data protection rules for all businesses handling personal data of EU citizens and extends responsibilities from data controllers to also cover data processors.

Three Updated Password Best Practices
Three Updated Password Best Practices

Weak passwords are a major information security issue, accounting for an astonishing 81% of hacking-related data breaches according to a recent Verizon Data Breach Investigation Report. The good news is that everyone can begin taking small steps to improve their own password security and stay safer online.

5 Problem Management best practices
5 Problem Management best practices

In Service Departments, there’s a tendency to focus on resolving immediate Incidents rather than addressing the underlying Problems.The catch-22 is that those Problems lead to more Incidents.

Triout Android Spyware Framework Makes a Comeback, Abusing App with 50 Million Downloads
Triout Android Spyware Framework Makes a Comeback, Abusing App with 50 Million Downloads

In August 2018, Bitdefender researchers stumbled across an Android malware framework, dubbed Triout, which packed massive surveillance capabilities.

Top Reasons to Think Outside the Router – Sub-par SaaS Performance
Top Reasons to Think Outside the Router – Sub-par SaaS Performance

We often hear from customers that their employees complain that Salesforce.com (or Office365 or Workday or any of myriad SaaS apps) is more responsive from home or from Starbucks than from the branch office.

4 reasons to reconsider your disaster recovery plan
4 reasons to reconsider your disaster recovery plan

SMBs may dislike refreshing IT equipment but they dislike refreshing disaster recovery solutions even more. These aren’t revenue-generating systems after all, and small businesses have other things to spend their money on. Still, DR solutions can fall out of date just as quickly as primary IT infrastructure.

DDI Uncovered: Bringing Networks Substantial Time and Cost Savings
DDI Uncovered: Bringing Networks Substantial Time and Cost Savings

Once upon a time, IT managers had a piece of paper in their hand detailing every IP address and MAC address within their organisation. But how could such an approach work now? The modern enterprise has to cope with BYOD with any number of workers bringing any number of devices; with IoT where even parts of the building’s infrastructure will have their own IP addresses.

How Different Team Topologies Influence DevOps Culture
How Different Team Topologies Influence DevOps Culture

The intangibility of DevOps makes it hard for leaders to come up with a clear-cut roadmap for adopting DevOps in their organisation. The meaning of DevOps is highly contextual, there are no popular methodologies with prescribed practices to abide by. However, healthy organisations exhibit similar patterns of behaviour, organisation and improvement efforts.

Ecuador suffered 40 Million Cyber-attacks after the Julian Assange arrest
Ecuador suffered 40 Million Cyber-attacks after the Julian Assange arrest

Ecuador suffered 40 million cyber-attacks on websites of public institutions since the arrest of Wikileaks founder Julian Assange.

Data Traffic Costs on Azure Demystified
Data Traffic Costs on Azure Demystified

Hosting applications in Azure involves careful consideration of the costs generated by three main components: computing, storage and network. IT administrators need to understand the resources associated with each category and their associated charges.

AI reveals 2018’s biggest cyber-threats: Part one — the rise of non-traditional IT
AI reveals 2018’s biggest cyber-threats: Part one — the rise of non-traditional IT

Once confined to just a handful of primitive PCs, today the internet has become so deeply integrated into all facets of our lives — from sensors in public trash cans to app-controlled Batmobiles — that the line between physical and virtual has begun to disappear.

Scaling Storage for Business Growth
Scaling Storage for Business Growth

No-one likes getting a bill they’re not expecting and that goes for IT managers too. Spiraling costs for storing data can be a constant headache, especially if you’re under budgetary pressure.

Improving IT operations – key to business success in digital transformation
Improving IT operations – key to business success in digital transformation

As businesses increasingly embrace digital transformation, it has become critical for CEOs to ensure their infrastructure investment supports the initiative. According to Gartner*, 47 percent of CEOs say they are being “challenged” by their board of directors to show progress in shifting toward a digital business model. 

6 bizarre IT disasters
6 bizarre IT disasters

You think it will never happen to you. You assume your hard drive, server, network or perhaps your entire data centre is safe from unexpected outages. But when IT disaster strikes, it comes without warning, and can be in some bizarre forms.

How a service catalogue helps you increase customer satisfaction?
How a service catalogue helps you increase customer satisfaction?

According to the Agile Manifesto, customer collaboration goes beyond contract negotiation. You can use this principle to professionalise your service catalogue. But how do you go about doing so?

Centre stage with Chris Testa-O’Neill, Applied Data Scientist at Microsoft…
Centre stage with Chris Testa-O’Neill, Applied Data Scientist at Microsoft…

A topical Q&A with a leading light within the enterprise IT community, discover more about what Chris's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...

Diversity in the developer community
Diversity in the developer community

Back in 2015 on International Women’s Day, Former UN Director General Ban Ki Moon published a statement. “The world will never realise 100% of its goals if 50% of its people cannot realise their full potential,” he said. “When we unleash the power of women, we can secure a future for all.”  

The habit of strategic planning for your cyber-security future
The habit of strategic planning for your cyber-security future

Oftentimes, it is said, we fight the last war. It happens when strategists fail to account for changes in the security environment, like the birth of the machine gun, the tank, or the improvised explosive device – technological innovations that altered how conflicts unfold.

Centre stage with Matthew Skelton, Founder and Head of Consulting at Conflux…
Centre stage with Matthew Skelton, Founder and Head of Consulting at Conflux…

A topical Q&A with a leading light within the enterprise IT community, discover more about what Matthew's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...

How to Overcome SIEM Limitations for Network Security
How to Overcome SIEM Limitations for Network Security

SIEM technology has been in existence for more than a decade, providing consolidated security reports from correlated event logs, often in order to achieve compliance with security standards. But SIEM can do better, by leveraging correlated security events to trigger alerts and appropriate reaction from SOC (Security Operations Center) teams.

Highlight of Computer Chipsets
Highlight of Computer Chipsets

It is often thought that a computer’s central processing unit (CPU) handles everything within a computer. To some extent, this is true; however, CPUs have delegates per se. These delegates are referred to as chipsets and they have dedicated and specific tasks to carry out. 

Centre stage with Dr Sue Black, Professor of Computer Science and Technology Evangelist in the Department of Computer Science at Durham University.
Centre stage with Dr Sue Black, Professor of Computer Science and Technology Evangelist in the Department of Computer Science at Durham University.

A topical Q&A with a leading light within the enterprise IT community, discover more about what Sue's day to day consists of, why she chose IT as a career, how to be successful, and her predictions for the future...

The New SD-WAN Edge Enables Improved Security Architectures
The New SD-WAN Edge Enables Improved Security Architectures

At the start of a new year, it’s popular to opine on what the new year might bring in terms of technology advances. My predictions for the WAN in 2018 have been covered in several publications here, here and here. In this blog, I’m going to expand on one of my predictions. 

Do cyber savvy employees pose a greater insider threat?
Do cyber savvy employees pose a greater insider threat?

Discussion of cyber threats is often focused purely on technical issues, but it is an organisation’s employees that can, ultimately, define the strength of its security. 

Why Is Data Recovery So Important?
Why Is Data Recovery So Important?

With the introduction of the General Data Protection Regulation last May, the ability of any organisation to recover data in the event of a crisis has become much more of an issue.

Centre stage with Aidan Finn, Principal Consultant, Innofactor Norway.
Centre stage with Aidan Finn, Principal Consultant, Innofactor Norway.

A topical Q&A with a leading light within the enterprise IT community, discover more about what Aidan's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...

5 Surprising Unstructured Data Trends
5 Surprising Unstructured Data Trends

For the last couple of years, Western Digital and 451 Research have taken a snapshot of the industry’s data challenges, by collecting the experience and opinions of real IT practitioners. This year they once again reached out to survey IT professionals to learn about current unstructured data trends. 

How the “CIO cycle” endangers digital transformation
How the “CIO cycle” endangers digital transformation

The role of the CIO is changing dramatically, and expectations have never been greater. What was once central to the job — namely operating IT — has made way for the pursuit of digital transformation. 

Centre stage with Marc Laliberte, Sr. Security Analyst at WatchGuard…
Centre stage with Marc Laliberte, Sr. Security Analyst at WatchGuard…

A topical Q&A with a leading light within the Cyber Security community, discover more about what Marc's day to day consists of, why he chose Cyber as a career, how to be successful, and his predictions for the future...

What Today's Women in Tech are Doing for Cybersecurity
What Today's Women in Tech are Doing for Cybersecurity

Recent research has predicted that women will represent more than 20 percent of the global cybersecurity workforce by the end of this year. While this is certainly an improvement from their representation in 2013 at 11 percent, it’s suffice to say that there’s still a lack of women in the industry.

5G, SD WAN, NVMe over Fabric will drive ITC hardware growth
5G, SD WAN, NVMe over Fabric will drive ITC hardware growth

Each year Martin Hingley of IT Candor makes a set of predictions for the IT and Communications (ITC) industry and this marks his 10th set of annual predictions. 

IoT Challenged but Growing
IoT Challenged but Growing

No sooner have we accepted IoT than innovations are transforming how this hyperconnected world will be implemented. Among the emerging technologies is fog computing, which moves computing closer to the end-user to decrease latency and bandwidth overload while improving access.

Does Edge Signal Disaster For Data Centres As We Know Them?
Does Edge Signal Disaster For Data Centres As We Know Them?

Does the incredible rise of edge computing mean ‘death’ to enterprise data centres and the cloud?

Expert found a DoS flaw in Windows Servers running IIS
Expert found a DoS flaw in Windows Servers running IIS

Windows servers running Internet Information Services (IIS) are vulnerable to denial-of-service (DoS) attacks carried out through malicious HTTP/2 requests.

IP EXPO Manchester Quiz
IP EXPO Manchester Quiz

Test your enterprise IT pop culture knowledge, share your score with colleagues, and see if you could do with a visit to IP EXPO Manchester this April!

Centre stage with Dr Nicola Millard, Head of Customer Insight and Futures at BT…
Centre stage with Dr Nicola Millard, Head of Customer Insight and Futures at BT…

A topical Q&A with a leading light within the IT community, discover more about what Nicola's day to day consists of, why she chose IT as a career, how to be successful in IT, and her predictions for the future...

Webinar: What makes a good SD-WAN solution?
Webinar: What makes a good SD-WAN solution?

The way we consume services has changed significantly over the last decade but when it comes to the Wide Area Network (WAN), the architecture we use to deliver services to our branch users is often stuck back in the 90s. 

Successful IoT Projects: The Key Role of Automation
Successful IoT Projects: The Key Role of Automation

The Internet of Things (IoT) is placing huge challenges on network managers across all industries. With booming endpoint numbers and generated traffic, device management and network efficiency become of paramount importance.

AI in Cyber – Challenges and Solutions
AI in Cyber – Challenges and Solutions

Jamie Graves from ZoneFox gives an insight into how we can use AI more effectively. It was standing room only when Jamie Graves of ZoneFox took to the stage at AI-Analytics X to discuss the strengths and weaknesses of AI.

Don’t miss your chance to see Christopher Wylie at IP EXPO Manchester 2019
Don’t miss your chance to see Christopher Wylie at IP EXPO Manchester 2019

The New Yorker calls Christopher Wylie “a pink-haired, nose-ringed oracle sent from the future." But he’s probably best known for his role in setting up – and then taking down – the cyber-warfare firm Cambridge Analytica!  

Unbelievable tales of cyber-attack – You won’t read about these in the media!
Unbelievable tales of cyber-attack – You won’t read about these in the media!

In Graham Cluley's absolute belter of a session, we delve into the extraordinary, like the companies who pretend to be hacked when they haven’t, or the attackers who went to exceptional lengths to steal millions from their employers.

Vaporworms – The Top Threat of 2019?
Vaporworms – The Top Threat of 2019?

Anyone that’s been paying attention knows that fileless malware has been on the rise for the past few years. But, did you know that we’re likely to see this infamous threat transform in new and menacing ways this year? Enter the Vaporworm. 

CSPs Must Adapt to Getting Older
CSPs Must Adapt to Getting Older

Today, cloud services providers (CSPs) are facing their own signs of aging. Discover the problems for maturing CSPs and their data centre operations. 

OpenSource The DevOps Enabler
OpenSource The DevOps Enabler

There is growing pressure on IT to provide faster and more agile platforms for business, Red Hat’s James Allen discussed why those adopting open source tooling and practices are succeeding at the expense of those who don’t.

Operators of the TheMoon botnet offer it as a service
Operators of the TheMoon botnet offer it as a service

Researchers at the CenturyLink Threat Research Labs discovered that the operators of the TheMoon IoT botnet are offering it as a service.

Ensuring Cloud Independence
Ensuring Cloud Independence

By 2020 over 90% of companies will be utilising cloud services offered by multiple providers, using various orchestration tools. To ensure they retain full mobility and flexibility, businesses need to be wary of components which could potentially cause cloud lock-in. 

Using the Sith mind-set to build and hone a Jedi SIEM
Using the Sith mind-set to build and hone a Jedi SIEM

Samantha Humphries, Senior Manager of Global Markets & Compliance at Rapid7 discusses SIEM myths, how to arm your Jedi (first responders), analytics and more. Discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today. 

Bringing together Blockchain, Internet of Things and Artificial Intelligence: Turning Skynet into reality
Bringing together Blockchain, Internet of Things and Artificial Intelligence: Turning Skynet into reality

The events of annus horribilis 2008 changed the world forever. The change was dubbed the "New Normal" and in turn gave rise to shifts in economic and political power which would have been considered the stuff of fantasy fiction as 2008 came to a close.

Getting the most out of people counting technology
Getting the most out of people counting technology

People counting technology is regarded as one of the most effective ways to understand how a building functions throughout the working week. This kind of intelligence is invaluable for many businesses but none more so than support service providers looking to gain a more accurate way to deploy resource and make increasingly thin margins more profitable. 

Giving WAN an edge
Giving WAN an edge

SD-WAN is now making its case. Allan Paton, Director of UK and Ireland at Silver Peak explores the evolution of SD-WAN and how it will replace the complexity of router-centric WAN architectures.

Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections
Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections

Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to bypass protections using zero-width spaces and deliver malicious messages to recipients.

Take it on the chin?
Take it on the chin?

Are British businesses firing employees unfairly as a result of possible data breach negligence? Ian Osborne, Vice President UK & Ireland at Shred-it, tackles this thorny issue.

Security of IoT in the Smart Office
Security of IoT in the Smart Office

In 2018, 11.2 billion devices worldwide are connected to the internet, and it is predicted that by 2020, a staggering 20.4 billion devices will be connected.

The lifeblood of Artificial Intelligence
The lifeblood of Artificial Intelligence

While everyone seems to be treating ‘artificial intelligence’ as the latest in-vogue topic, it’s important to remember it is far from a new development. It is not my intention to dilute the excitement of AI’s minefield of potential but, like anything that has the power to change the world, it requires an element of respect and a lot more know-how. 

Security researchers at Trend Micro recently discovered a PowerShell-based backdoor that resembles a malware used by MuddyWater threat actor.
Security researchers at Trend Micro recently discovered a PowerShell-based backdoor that resembles a malware used by MuddyWater threat actor.

Malware researchers at Trend Micro have discovered a Powershell-based backdoor that is very similar to a malware used by MuddyWater APT group.

Azure migration – the view from the DevOps Manager
Azure migration – the view from the DevOps Manager

Ed Broking is a wholesale insurance and reinsurance broker, sourcing policies and coverage across a broad range of industries. Based in London, Ed Broking operates a number of international offices to support their global operations. Faced with replacing an ageing hosted server system, Ed Broking took the decision to move to fully hosted Microsoft Azure platform. This is their story.

Media in the cloud
Media in the cloud

The cloud is driving change in the media industry at an incredible rate, thanks to benefits achieved by its scalability and affordability. In an exclusive roundtable interview, industry experts debate the unique needs of the sector and outline strategies for success in the years ahead. 

Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW
Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW

Security experts at Imperva reported an attack against Drupal Web servers running on Linux-based systems. Hackers exploited the Drupalgeddon2 flaw (CVE-2018-7600) along with other issues. The Drupalgeddon2 could be exploited to take over a website, it affects Drupal versions 6, 7 and 8.

IoT in the shadows
IoT in the shadows

BYOD is a thing of the past - or is it? Gary Cox, Technology Director for Infoblox in Western Europe, explores the troubling rise of Shadow IoT and how to detect it. With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices to enterprise networks, IT teams find themselves faced with greater complexity and more security issues than ever before.

The currency of blockchain
The currency of blockchain

Blockchain is more - much more - than Bitcoin. Jonathan Wilkins, Marketing Director at EU Automation explains how blockchain can automate a range of business processes. Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born in 1975, but there remains speculation about the inventor's true identity.

"Give 110 percent" voted the most-hated office jargon of 2018

The survey, which was conducted at IP EXPO 2018, found that over a quarter (26 percent) of the IT professionals questioned selected “Give 110 percent” as their most frustrating office jargon of the year, followed by "Blue sky thinking" (19 percent), and "Low hanging fruit" (17 percent).

Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a local attacker to decrypt data.

Poor User Experience? DNS Can Help
Poor User Experience? DNS Can Help

Today, the user experience of digital services has the greatest impact on the perception of an organisation’s ability to operate competently and successfully in a digital world. It is the key competitive differentiator, and is essential for avoiding the risk of customer churn.

Five key factors to delivering optimal user experience for AWS
Five key factors to delivering optimal user experience for AWS

Whether or not you literally “own” the infrastructure, application or networks that deliver your apps and services, as an IT leader or technology professional you own the outcome. Here are five factors that you should consider to deliver an optimal user experience while using AWS.

Will serverless fulfill the expectations of cloud?
Will serverless fulfill the expectations of cloud?

The term cloud computing became popular somewhere halfway the first decade of this century, short before the launch of Amazon S3 and EC2. In the little over 10 years since, we have come a long way. However, I believe we still have to uncover the full potential of cloud computing. Although not part of the formal characteristics of cloud computing, there have been are two simmering expectation of cloud computing that we have failed to meet up to now. 

Tackling security in the public and private cloud
Tackling security in the public and private cloud

The Challenge: Modern data centre's are changing rapidly. Thanks to virtualisation, more and more organisations are shifting to resilient, on-demand, private cloud environments, delivering applications faster and more cheaply than ever before. Software defined data centre's (SDDCs) are the new norm. 

CIO's are feeling the need for speed
CIO's are feeling the need for speed

The warnings have been out there: Mobile and social accelerating customer interactions. Big data providing deep lakes of potential knowledge. Billions of connected gadgets bringing forth a global Internet of Things (IoT).

Open source as the basis of enterprise
Open source as the basis of enterprise

We think of Enterprise organisations as closed societies, working in isolation in pursuit of the advantage over their competitors. It might come as a surprise then to think about how much Open Source software is used within even the largest and most secretive companies around the world.

The convergence of data science and software development
The convergence of data science and software development

There is no need for data scientists to be outright software experts thanks to emerging tools for using data delivered through the cloud. Making use of the cloud as a shared platform ensures the delivery of the right data to the right people at the right time, without the inefficiency of workflows passing through many hands through hand-overs.

Good logging - the foundation of operability for serverless and IoT
Good logging - the foundation of operability for serverless and IoT

Serverless is an emerging “new normal” for web-based applications and services where the unit of deployment and billing is a single function a few lines of code in length. Serverless enables radical transparency in billing and radical ease of use for developers; when combined with with marketplace (“app store”) offerings from cloud vendors like AWS. 

Hacking the Blockchain
Hacking the Blockchain

Due to its cryptographic background, a common perception is that blockchain is inherently secure. But blockchain is not un-hackable or hidden from potential manipulation.

It's time to stop ignoring IoT security
It's time to stop ignoring IoT security

Smart homes and smart cities will likely be top of mind in conversations around the Internet of Things (IoT), but the application of IoT is becoming far more widespread than these two areas as a growing number of industries adopt IoT devices.

Exploring an AI foundation for the network in the IoT age
Exploring an AI foundation for the network in the IoT age

With the soaring number of mobile and IoT devices, and the onslaught of new apps that businesses are faced with on their wireless network, it is time for innovation that can help IT scale and meet these new requirements. 

Blood diamonds to voter fraud - do you know what Blockchain is capable of?
Blood diamonds to voter fraud - do you know what Blockchain is capable of?

Our recent research uncovered that just over a third of Brits (35%) would not trust an organisation using blockchain technology to keep their information secure. But with so many uses beyond recording cryptocurrency transactions, we think people need to wake up to the real potential for blockchain. Here are five of the most interesting use cases for blockchain from the last year. 

Five ways AI is augmenting our lives
Five ways AI is augmenting our lives

AI and robotics are going to create almost 60 million more jobs globally, that’s according to a new report from the World Economic Forum. The Swiss think tank released its Future of Jobs report to put facts behind the much-debated topic of AI and job displacement.

Workplace of the future: collaboration of human and AI
Workplace of the future: collaboration of human and AI

Today the world faces one of its most daunting, but also exciting tasks - how organisations will transition into the future with Artificial Intelligence entering the workplace. However we look at it, AI directly threatens a large portion of the global workforce whose jobs will be competing with digitisation, automation, and continuously improving AI. 

Blockchain workforce development
Blockchain workforce development

With the explosion of cryptocurrency over the past of years, many have been debating the longevity and legitimacy of cryptocurrencies in our global economy. However, those with a keener eye were fascinated with something far more useful and widely applicable: Blockchain — the technology that made cryptocurrency possible in the first place.

Why leading companies are paying hackers for security help
Why leading companies are paying hackers for security help

Cybercriminals have never been so notorious. As technology innovation seems to outpace security defenses, organizations are turning to ethical-hackers to assess risk and see where they are most vulnerable.

Want to hire the best AI talent?
Want to hire the best AI talent?

Dr Greg Benson, Professor of Computer Science at the University of San Francisco and Chief Scientist at SnapLogic, shares his tips for hiring the best AI talent and a what it means to work across both industry and academia for AI development.

Poison pixels
Poison pixels

Stegware, the weaponisation of steganography by cyber attackers, is on the rise. Find out why this is bad news for IT professionals. 

Thinking like a cyber adversary
Thinking like a cyber adversary

In a world of sensitive data and tightening regulations, discover what you should do as an organisation!

The social good of AI and advanced analytics
The social good of AI and advanced analytics

On any given day AI is both the saviour and the doom of human kind. Opinion on the technology can change as quickly as the wind. But behind the curtain of doubt AI programs are already making incredible benefits to our lives, often without us even realising.

Cybersecurity in the NHS – separating people from passwords
Cybersecurity in the NHS – separating people from passwords

Troublesome political climate has put the NHS, like many other Public-Sector organisations, under immense pressure to cut costs and drive operational efficiencies whilst simultaneously embracing new digital methods, in a bid to improve services. As a result, proper and necessary data security controls have not yet been totally embraced…

Hospital closure ranks top for british cyber fears
Hospital closure ranks top for british cyber fears

From ransomware and exploding power plants to AI and identity theft - new survey from IP EXPO Manchester uncovers the cyber fears of the UK.