A topical Q&A with a leading light within the IT community, discover more about what Galina's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...
With the exponential increase in traffic demands and the high encryption rates for that traffic, enterprises face an ever-expanding threat surface when it comes to cybersecurity. We have an unacceptable blind spot in network security called the SSL inspection gap.
An organisation that is transitioning to a cloud provider such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) should immediately consider a shift towards a new model of security, namely continuous control and enforcement of secure configuration of cloud services.
A topical Q&A with a leading light within the IT community, discover more about what Aleksander's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
In order to keep pace with emerging market trends, fluctuating customer demands, and increased competition, many of today’s organisations are embracing digital transformation. However, digitally transforming is no easy feat.
With tools such as Microsoft Teams underpinned by solutions including the Azure Cloud, Dynamics and the Power Platform, the Microsoft ecosystem is ensuring that pioneering enterprises can stay at the cutting edge of business.
Combining the security capabilities of first-tier cloud service providers with a sophisticated cloud-native SaaS app minimises attack vectors as well as speeds recovery times. But there’s another benefit everyone will understand: lower costs.
A topical Q&A with a leading light within the IT community, discover more about what Donnie's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
More than half of businesses consider their employees to be the weakest link in corporate cybersecurity, as their actions may put company data and systems at risk. That’s why companies invest heavily in educating them on basic IT security skills.
When it comes to acquiring new technology, every business follows the same path, whether it is an SME or an international giant. Time-consuming market research is one of the first steps in the process, where tens or hundreds of companies and solutions are compared against one another – complicated all the more by a lack of impartial information.
A topical Q&A with a leading light within the IT community, discover more about what Emma's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...
With Digital Transformation EXPO Europe on the horizon, you may be in the market for a platform to host your latest online projects. When it comes to getting the most in terms of control and configuration, you essentially have two options: a virtual private server (VPS) or a dedicated server.
Conversations about digital transformation are happening every day all around the world. No matter what industry you’re in, you’ll find efforts to bring digital tools into the mix to transform the way companies work.
A topical Q&A with a leading light within the IT community, discover more about what Al's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
Challenges, Opportunities, and Real World Insights from UK Data Scientists - Back in 2017, The Economist1 printed an article that suggested the world’s most valuable resource was no longer oil, but data.
A topical Q&A with a leading light within the IT community, discover more about what Lisa's day to day consists of, what she thinks is the industry's biggest challenge, her thoughts about tech development, and her predictions for the future...
When you think of agile working methods, Scrum is one that quickly comes to mind. But while Scrum works great for implementing changes and projects, it has a far from perfect success rate in service desk environments. Instead, try Kanban – an agile method that is much more suited towards service desks.
As legacy systems have struggled to meet the speed expected by the modern customer, the introduction of artificial intelligence (AI) into the contact centre has allowed customer service departments to regain the upper hand.
Despite increased cybersecurity budgets and complex security architectures, most organisations still struggle to maintain the right level of threat visibility and the ability to detect advanced attacks.
A topical Q&A with a leading light within the IT community, discover more about what Jake's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
As businesses become more reliant on software applications, the enterprise networking environment is becoming increasingly challenging. Cloud-based applications require greater flexibility, agility, and scalability from underlying networks.
Changes driven by technology have drastically altered perceptions and expectations of both the “work experience” and the “customer experience” bringing us to the cusp of new experiences, supported by new and emerging technologies.
A topical Q&A with a leading light within the IT community, discover more about what Anthony's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
A topical Q&A with a leading light within the IT community, discover more about what Rik's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
In today’s digitised world, industry leaders are more effective in every aspect of data analytics; they run state-of-the-art analytics applications powered by GPU’s and high-performance storage infrastructures to capture, store and analyse more data faster and make better business decisions.
A topical Q&A with a leading light within the IT community, discover more about what Jeff's day to day consists of, what he thinks is the industry's biggest challenge, his thoughts about tech development, and his predictions for the future...
Tech is the engine that keeps many companies running, yet business executives don’t think about it until their email stops working. Conversely, the IT director thinks about IT all the time to ensure that it stays up operational.
What if we set aside elaborate graphical messages and assume malware authors did some degree of masking malicious infections, what would you look for? What are some common signs of infection?
This post will cover just that – and based on a real-world example that I’ve been informed about personally!
The Digital Transformation special report, published in The Times looks at why many organisations remain in the dark about what “digital transformation” really means for them and why it has been long considered crucial for any business.
Citrix Cloud is a revolutionary way to deliver Citrix products by offloading the control plane and providing companies with one of the fastest ways to deploy Citrix into a production-ready environment.
As we get ready to enter a new decade, businesses large and small face a long list of strategic challenges – and technology will play a vital role in meeting them, particularly when it comes to communications infrastructure.
With new software releases and developments, often times you’ll also see a changelog of some sort. Changelogs describe alterations new releases contain compared to prior versions. Reviewing these changelogs is important for many reasons.
The tickets keep rolling in and they are all over the place. Of course, the blocked printer on floor 7 takes a back seat if all of the company’s internet is under attack by outage monsters. However, situations are rarely that clear-cut. How do you prioritise incidents on a detailed level?
For the past four years, the DNS Global Threat Report created from Coleman Parkes survey data explored the technical causes and behavioural responses of Domain Name System (DNS) threats and their potential effects on businesses globally.
Technology has the power to transform virtually any industry when it’s used correctly. In the UK at the moment, the public sector seems to need this innovation more than ever, to help overcome everything from skills shortages, to overwhelming uncertainty caused by the impending departure from the EU.
You can now power your Kubernetes platform by auto-deploying policy configurations for redirect and rewrite features like redirecting HTTP traffic, blocking URLs, or responding to a request that requires policy evaluation.
Ten years ago, being in charge of a large enterprise IT operation meant you were also in the real estate business, operating one or more climate-controlled facilities with raised floors and lots of server racks.
Jack Bedell-Pearce, Managing Director at 4D Data Centres, considers the remaining opportunities, threats, and challenges businesses will face in the second half of this year, sharing some advice along the way.
Customer experience is increasingly important to the modern service desk. Luckily, there are a lot of ways to make sure that your service delivery always meets your customer's demands. These are some of our favourites.
So, you’re ready to improve your services. Making a customer journey sounds like a plan, but what’s the goal of customer journey mapping? And once you’ve decided it’s the right approach for your service desk, how do you create customer journeys for your services?
Spring cleaning season has almost finished and summer is almost here, if you haven’t gotten around to giving your network a good spring cleaning yet, it’s never too late to step back and sweep out the cobwebs to improve your security posture.
Digital transformation is shaking up the way companies do business. One key outcome is the focus on new ways to unlock value from existing data, even whilst embracing next-gen social, mobile, cloud, and analytics technologies.
In a recent blog post, I gave some insight into some of the fascinating customer-facing work we do inside the Office of the CTO at Citrix and, at the same time, introduced eight of the most commonly observed shifting dynamics that are on the minds of today’s CIOs and CTOs.
The General Data Protection Regulation (GDPR), effective from 25 May 2018, enhances existing data protection rules for all businesses handling personal data of EU citizens and extends responsibilities from data controllers to also cover data processors.
Weak passwords are a major information security issue, accounting for an astonishing 81% of hacking-related data breaches according to a recent Verizon Data Breach Investigation Report. The good news is that everyone can begin taking small steps to improve their own password security and stay safer online.
We often hear from customers that their employees complain that Salesforce.com (or Office365 or Workday or any of myriad SaaS apps) is more responsive from home or from Starbucks than from the branch office.
SMBs may dislike refreshing IT equipment but they dislike refreshing disaster recovery solutions even more. These aren’t revenue-generating systems after all, and small businesses have other things to spend their money on. Still, DR solutions can fall out of date just as quickly as primary IT infrastructure.
Once upon a time, IT managers had a piece of paper in their hand detailing every IP address and MAC address within their organisation. But how could such an approach work now? The modern enterprise has to cope with BYOD with any number of workers bringing any number of devices; with IoT where even parts of the building’s infrastructure will have their own IP addresses.
The intangibility of DevOps makes it hard for leaders to come up with a clear-cut roadmap for adopting DevOps in their organisation. The meaning of DevOps is highly contextual, there are no popular methodologies with prescribed practices to abide by. However, healthy organisations exhibit similar patterns of behaviour, organisation and improvement efforts.
Hosting applications in Azure involves careful consideration of the costs generated by three main components: computing, storage and network. IT administrators need to understand the resources associated with each category and their associated charges.
Once confined to just a handful of primitive PCs, today the internet has become so deeply integrated into all facets of our lives — from sensors in public trash cans to app-controlled Batmobiles — that the line between physical and virtual has begun to disappear.
businesses increasingly embrace digital transformation, it has become critical
for CEOs to ensure their infrastructure investment supports the initiative.
According to Gartner*, 47 percent of CEOs say they are being “challenged” by
their board of directors to show progress in shifting toward a digital business
You think it will never happen to you. You assume your hard
drive, server, network or perhaps your entire data centre is safe from
unexpected outages. But when IT disaster strikes, it comes without warning, and
can be in some bizarre forms.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Chris's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...
Back in 2015 on International Women’s Day,
Former UN Director General Ban Ki Moon published a statement. “The world will
never realise 100% of its goals if 50% of its people cannot realise their full
potential,” he said. “When we unleash the power of women, we can secure a
future for all.”
Oftentimes, it is said, we fight the last war. It happens
when strategists fail to account for changes in the security environment, like
the birth of the machine gun, the tank, or the improvised explosive device –
technological innovations that altered how conflicts unfold.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Matthew's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...
technology has been in existence for more than a decade, providing consolidated
security reports from correlated event logs, often in order to achieve
compliance with security standards. But SIEM can do better, by leveraging
correlated security events to trigger alerts and appropriate reaction from SOC
(Security Operations Center) teams.
It is often thought that a computer’s central processing unit (CPU)
handles everything within a computer. To some extent, this is true; however,
CPUs have delegates per se. These delegates are referred to as chipsets and
they have dedicated and specific tasks to carry out.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Sue's day to day consists of, why she chose IT as a career, how to be successful, and her predictions for the future...
At the start of a new year, it’s popular to opine on what the new year
might bring in terms of technology advances. My predictions for the WAN in 2018
have been covered in several publications here, here and here. In this blog,
I’m going to expand on one of my predictions.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Aidan's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...
For the last couple of years, Western Digital and 451
Research have taken a snapshot of the industry’s data challenges, by collecting
the experience and opinions of real IT practitioners. This year they once again
reached out to survey IT professionals to learn about current unstructured data
A topical Q&A with a leading light within the Cyber Security community, discover more about what Marc's day to day consists of, why he chose Cyber as a career, how to be successful, and his predictions for the future...
Recent research has predicted that women will represent more than 20 percent of the global cybersecurity workforce by the end of this year. While this is certainly an improvement from their representation in 2013 at 11 percent, it’s suffice to say that there’s still a lack of women in the industry.
No sooner have we accepted IoT than innovations
are transforming how this hyperconnected world will be implemented. Among the
emerging technologies is fog computing, which moves computing closer to the
end-user to decrease latency and bandwidth overload while improving access.
A topical Q&A with a leading light within the IT community, discover more about what Nicola's day to day consists of, why she chose IT as a career, how to be successful in IT, and her predictions for the future...
The way we consume services has changed significantly over
the last decade but when it comes to the Wide Area Network (WAN), the
architecture we use to deliver services to our branch users is often stuck back
in the 90s.
The Internet of Things (IoT) is placing huge challenges on network
managers across all industries. With booming endpoint numbers and generated
traffic, device management and network efficiency become of paramount
Jamie Graves from ZoneFox gives an insight into how we can
use AI more effectively. It was standing room only when Jamie Graves of ZoneFox
took to the stage at AI-Analytics X to discuss the strengths and weaknesses of AI.
The New Yorker calls Christopher Wylie “a pink-haired, nose-ringed
oracle sent from the future." But he’s probably best known for his role in setting up – and then
taking down – the cyber-warfare firm Cambridge Analytica!
In Graham Cluley's absolute belter of a session, we delve into the extraordinary,
like the companies who pretend to be hacked when they haven’t, or the attackers
who went to exceptional lengths to steal millions from their employers.
Anyone that’s been paying attention knows that fileless
malware has been on the rise for the past few years. But, did you know that
we’re likely to see this infamous threat transform in new and menacing ways
this year? Enter the Vaporworm.
growing pressure on IT to provide faster and more agile platforms for business,
Red Hat’s James Allen discussed why those adopting open source tooling and
practices are succeeding at the expense of those who don’t.
By 2020 over 90% of companies will be utilising cloud
services offered by multiple providers, using various orchestration tools. To
ensure they retain full mobility and flexibility, businesses need to be wary of
components which could potentially cause cloud lock-in.
Samantha Humphries, Senior Manager of Global Markets &
Compliance at Rapid7 discusses SIEM myths, how to arm your Jedi (first
responders), analytics and more. Discover the tools and techniques hackers use
to defeat the expensive security safeguards used in many corporate environments
The events of annus horribilis 2008 changed the
world forever. The change was dubbed the "New Normal" and in turn
gave rise to shifts in economic and political power which would have been
considered the stuff of fantasy fiction as 2008 came to a close.
counting technology is regarded as one of the most effective ways to understand
how a building functions throughout the working week. This kind of intelligence
is invaluable for many businesses but none more so than support service
providers looking to gain a more accurate way to deploy resource and make increasingly
thin margins more profitable.
While everyone seems to be treating
‘artificial intelligence’ as the latest in-vogue topic, it’s important to
remember it is far from a new development. It is not my intention to dilute the
excitement of AI’s minefield of potential but, like anything that has the power
to change the world, it requires an element of respect and a lot more know-how.
Ed Broking is a wholesale insurance and reinsurance broker, sourcing policies and coverage across a broad range of industries. Based in London, Ed Broking operates a number of international offices to support their global operations. Faced with replacing an ageing hosted server system, Ed Broking took the decision to move to fully hosted Microsoft Azure platform. This is their story.
The cloud is driving change in the media industry at an incredible rate, thanks to benefits achieved by its scalability and affordability. In an exclusive roundtable interview, industry experts debate the unique needs of the sector and outline strategies for success in the years ahead.
Security experts at Imperva reported an attack against Drupal Web servers running on Linux-based systems. Hackers exploited the Drupalgeddon2 flaw (CVE-2018-7600) along with other issues. The Drupalgeddon2 could be exploited to take over a website, it affects Drupal versions 6, 7 and 8.
BYOD is a thing of the past - or is it? Gary Cox, Technology Director for Infoblox in Western Europe, explores the troubling rise of Shadow IoT and how to detect it. With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices to enterprise networks, IT teams find themselves faced with greater complexity and more security issues than ever before.
Blockchain is more - much more - than Bitcoin. Jonathan Wilkins, Marketing Director at EU Automation explains how blockchain can automate a range of business processes. Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born in 1975, but there remains speculation about the inventor's true identity.
The survey, which was conducted at IP EXPO 2018, found that over a quarter (26 percent) of the IT professionals questioned selected “Give 110 percent” as their most frustrating office jargon of the year, followed by "Blue sky thinking" (19 percent), and "Low hanging fruit" (17 percent).
Today, the user experience of digital services has the greatest impact on the perception of an organisation’s ability to operate competently and successfully in a digital world. It is the key competitive differentiator, and is essential for avoiding the risk of customer churn.
Whether or not you literally “own” the infrastructure, application or networks that deliver your apps and services, as an IT leader or technology professional you own the outcome. Here are five factors that you should consider to deliver an optimal user experience while using AWS.
The term cloud computing became popular somewhere halfway the first decade of this century, short before the launch of Amazon S3 and EC2. In the little over 10 years since, we have come a long way. However, I believe we still have to uncover the full potential of cloud computing. Although not part of the formal characteristics of cloud computing, there have been are two simmering expectation of cloud computing that we have failed to meet up to now.
The Challenge: Modern data centre's are changing rapidly. Thanks to virtualisation, more and more organisations are shifting to resilient, on-demand, private cloud environments, delivering applications faster and more cheaply than ever before. Software defined data centre's (SDDCs) are the new norm.
The warnings have been out there: Mobile and social accelerating customer interactions. Big data providing deep lakes of potential knowledge. Billions of connected gadgets bringing forth a global Internet of Things (IoT).
We think of Enterprise organisations as closed societies, working in isolation in pursuit of the advantage over their competitors. It might come as a surprise then to think about how much Open Source software is used within even the largest and most secretive companies around the world.
There is no need for data scientists to be outright software experts thanks to emerging tools for using data delivered through the cloud. Making use of the cloud as a shared platform ensures the delivery of the right data to the right people at the right time, without the inefficiency of workflows passing through many hands through hand-overs.
Serverless is an emerging “new normal” for web-based applications and services where the unit of deployment and billing is a single function a few lines of code in length. Serverless enables radical transparency in billing and radical ease of use for developers; when combined with with marketplace (“app store”) offerings from cloud vendors like AWS.
Smart homes and smart cities will likely be top of mind in conversations around the Internet of Things (IoT), but the application of IoT is becoming far more widespread than these two areas as a growing number of industries adopt IoT devices.
With the soaring number of mobile and IoT devices, and the onslaught of new apps that businesses are faced with on their wireless network, it is time for innovation that can help IT scale and meet these new requirements.
Our recent research uncovered that just over a third of Brits (35%) would not trust an organisation using blockchain technology to keep their information secure. But with so many uses beyond recording cryptocurrency transactions, we think people need to wake up to the real potential for blockchain. Here are five of the most interesting use cases for blockchain from the last year.
AI and robotics are going to create almost 60 million more jobs globally, that’s according to a new report from the World Economic Forum. The Swiss think tank released its Future of Jobs report to put facts behind the much-debated topic of AI and job displacement.
Today the world faces one of its most daunting, but also exciting tasks - how organisations will transition into the future with Artificial Intelligence entering the workplace. However we look at it, AI directly threatens a large portion of the global workforce whose jobs will be competing with digitisation, automation, and continuously improving AI.
With the explosion of cryptocurrency over the past of years, many have been debating the longevity and legitimacy of cryptocurrencies in our global economy. However, those with a keener eye were fascinated with something far more useful and widely applicable: Blockchain — the technology that made cryptocurrency possible in the first place.
Cybercriminals have never been so notorious. As technology innovation seems to outpace security defenses, organizations are turning to ethical-hackers to assess risk and see where they are most vulnerable.
Dr Greg Benson, Professor of Computer Science at the University of San Francisco and Chief Scientist at SnapLogic, shares his tips for hiring the best AI talent and a what it means to work across both industry and academia for AI development.
On any given day AI is both the saviour and the doom of human kind. Opinion on the technology can change as quickly as the wind. But behind the curtain of doubt AI programs are already making incredible benefits to our lives, often without us even realising.
Troublesome political climate has put the NHS, like many other Public-Sector organisations, under immense pressure to cut costs and drive operational efficiencies whilst simultaneously embracing new digital methods, in a bid to improve services. As a result, proper and necessary data security controls have not yet been totally embraced…