How safe are connected vehicles really?

Drawing upon cyber-attacks gone by, Natalie Sauber of Arcadis questions whether connected vehicles will ever be truly safe, and outlines the steps auto manufacturers...

Take the person out of personal data, UK customers demand

A new survey by Trūata highlights that customers are more worried than ever about the way their data is used and shared by companies,...

Look before you leap

Adrian Taylor, regional vice president at A10 Networks highlights the five key questions you should be asking before delivering your applications to the cloud. ...

The good, the bad and the ugly of network security implementation

Thorsten Kurpjuhn, european security market development manager at Zyxel, explores how network managers and internet users can navigate the online minefield and limit the...

Multi-cloud’s new multiculturalism

Tristan Liverpool, systems engineering director at F5 Networks, assesses how multi-cloud is changing the app development game and bringing previously siloed teams closer together. ...

Russian hackers infiltrate corporate networks via office printers

The Russians are at it again. This week the Microsoft Threat Intelligence Centre published a blog post saying that the Russian hacking group known as Strontium...

DataVita secures its place on Scottish Government Cloud Services Framework

Lanarkshire-based DataVita has announced its inclusion on the Scottish Government’s new Cloud Services Framework. Through the framework, the tech firm will...

Hackers in the classroom

With back-to-school season upon us, this year, hackers can (and will) infiltrate your child’s classroom if the necessary precautions aren’t taken. ...

Huawei joins Paris Call to help secure cyberspace

Huawei Technologies has joined the Paris Call, a declaration aimed at spurring collective action toward securing cyberspace (which in my opinion, more companies need...

How hybrid IT is remaking the perimeter in its own image

Scott Gordon, (CISSP) CMO at Pulse Secure, explores how the increased investment in hybrid IT is creating a new perimeter demanding a matched investment in...

Top Stories

Data Analytics & Security