Quantcast
Channel: Recent Articles
Browsing all 17 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Five steps to an effective layered defence strategy

In-depth Analysing weak spots in an IT system can be challenging, which is why a layered approach is important

View Article



Image may be NSFW.
Clik here to view.

Trust in public cloud providers’ security is increasing

Analysis Enhanced security measures are encouraging use of cloud computing

View Article

Image may be NSFW.
Clik here to view.

What is penetration testing?

In-depth Sure, you’ve got your firewall – but is your business really safe from cyber attacks?

View Article

Image may be NSFW.
Clik here to view.

What is cloud-to-cloud backup?

In-depth C2C backup is growing in popularity, so what is it, and how can it help your business if the worst happens?

View Article

Image may be NSFW.
Clik here to view.

Automating the end of discrimination

In-depth Tech tools such as AI and bots can help improve equality, but only if we humans build and use them the right way

View Article


Image may be NSFW.
Clik here to view.

What is Robotic Process Automation?

In-depth How does RPA work, how is it used and what are the pros and cons?

View Article

Image may be NSFW.
Clik here to view.

How to enhance your backup strategy

In-depth No matter what stage your organisation’s backup strategy is at, there is always room to improve

View Article

Image may be NSFW.
Clik here to view.

Five giveaways that show an email is a phishing attack

In-depth One of the biggest problems in cyber security is the phishing email

View Article


Image may be NSFW.
Clik here to view.

The human element of a cyber security strategy for email

In-depth The same employees falling prey to phishing tactics are the final piece of a comprehensive cyber security strategy for e

View Article


Image may be NSFW.
Clik here to view.

What is workload automation?

In-depth How does workload automation benefit organisations and what are the use cases?

View Article

Image may be NSFW.
Clik here to view.

Who should take ownership of your cyber security strategy?

In-depth We explore the options of who should be in charge of this increasingly important area

View Article

Image may be NSFW.
Clik here to view.

Our 5-minute guide to Managed File Transfer

In-depth The ins and outs of MFT: What it is and why it surpasses the competition

View Article

Image may be NSFW.
Clik here to view.

Cost of critical application failures revealed

Analysis Financial losses are heightened during periods of peak customer demand

View Article


Image may be NSFW.
Clik here to view.

How to choose an embedded analytics vendor

In-depth The advantages of embedded analytics can only be achieved in partnership with the right vendor

View Article

Image may be NSFW.
Clik here to view.

What is data analytics?

In-depth Data is just data, but with analytics it becomes actionable information

View Article


Image may be NSFW.
Clik here to view.

What does the future of work look like?

In-depth How remote working, automation and AI will affect the way we work

View Article

Image may be NSFW.
Clik here to view.

Five reasons why digital transformation is essential for business growth

In-depth Whatever a company’s vision for the future, it must include digital transformation in order to grow

View Article

Browsing all 17 articles
Browse latest View live




Latest Images