By Jasmit Sagoo, senior director, Head of Technology UK&I, Veritas.
Read More
By Mat Clothier, CEO at Cloudhouse.
Read More
Deceiving the enemy into believing one is stronger than one actually is, manipulating them into taking self-defeating actions or tricking them into believing the costs of a military raid outweigh the spoils of victory, are tactics repeatedly used in warfare throughout history. By Carolyn...
Read More
By Sharad Patel, data privacy expert, PA Consulting.
Read More
By Sion Lewis, VP of EMEA at LogMeIn.
Read More
By Ken Mortensen, Data Protection Officer, InterSystems.
Read More
There are three key components when we talk about the concept of privacy: Laws, customs and...
Read More
The adoption of cloud computing by businesses is progressing at an incredible rate. The cloud...
Read More
With or without realising, we’ve encountered the benefits of digital transformation in various...
Read More
Keeping your software delivery in peak condition. By Jeff Keyes at Plutora.
Read More
Often when we think about cybersecurity, especially about the impacts of breaches, our minds turn...
Read More
Today’s business world is driven by data, enabling employees, contractors, partners and vendors...
Read More