Security Think Tank: Security testing a vital part of software procurement
Cloud storage needs an audit process to stay compliant
Security Think Tank: Risk-based security will ease software testing challenge
Security Think Tank: Beef up due diligence
Security Think Tank: If cost is king, security suffers
Security Think Tank: How to ensure vendors act efficiently
Security Think Tank: Security pros need to be plugged into procurement
Security Think Tank: Procurement and security are uneasy bedfellows
451 survey finds enterprise flash storage adoption real, and growing
EU Data Protection Regulation: fines up to €100m proposed
IT may not have to worry about mobile device backup
Has your project got stuck PCI syndrome?
Byte Night 2013 - Thanks a million
Security Think Tank: Cyber insurance no substitute good security practices
Array-based or vSphere Replication for VMware SRM?
Security Think Tank: When cyber insurance is right and when it is not
Outsourcing: The soft underbelly of cyber risks
Who owns your LinkedIn account?
Security Think Tank: Data insurance will not fix broken systems
Security Think Tank: Cyber insurance is a two-way street
Security Think Tank: Cyber insurance – buyers beware
BYOD: data protection and information security issues
Do not overlook the weak link in IT security
Information security in the cloud: Time to switch to panic mode?
The feminisation of the IT department
Forrester: Modern app development requires a modern set of metrics
Is it time to move from data protection to information management?
Byte Night 2013: Tonight's the night
Privacy concerns in the digital world
Design applications to get the right data
Laying the iOS 6 Foundation
The best storage for VDI environments? RAM, of course
Nirvanix failure – a blow to the cloud storage model?
What ever happened to the paper-free office ?
How wearable gadgets will impact the IT department
The intellectual property challenges from 3D printing
How to make IT professionals more effective and happy in their jobs
Security Think Tank: Consumer cloud is fine for business, if....
The accessibility challenge for 'digital by default' public services
Security Think Tank: Firms must take responsibility for security in the cloud
Risk assessment for APTs
Security Think Tank: Four steps to using public cloud storage
Operational security: The headache of IT security health checks
Security Think Tank: In the cloud, low or no cost means little or no control
Security Think Tank: How to keep data secure when resident or used by cloud applications
Gartner: Benefits of mobile collaboration
Cloud storage creeps up the enterprise agenda
The politics of software asset management
One step ahead - the importance of staying in control of your organisation’s BYOD policy
Google, privacy and data protection: One step beyond (the law)?
The power of a million What is £1 million worth?
IT security: could you be the key?
Is the smart meter programme really doomed? Don’t panic...
Match disk type to VMs to boost VMware storage performance
Security Think Tank: Physical security should be replicated in cyber world
Enterprise IT skills must keep pace with game-changing technologies
Security Think Tank: Five steps to protect IP from cyber espionage
Security Think Tank: IP protection is as weak as the weakest link – fix the supply chain security
Security Think Tank: Follow an information-led, risk-based process to protect IP
When to use flash SSD instead of SAS or SATA?
Security Think Tank: Identify and protect the crown jewels
Four key questions in disaster recovery planning
BI: From specialist capability to mass-market availability
Security Think Tank: Your sensitive information is at risk
The Death Of Cloud Has Been Greatly Exaggerated
Forrester: Three Best Practice Tips For Business Intelligence Success
How to appoint a new outsourcing supplier
How to handle a software audit
The dangers of internet cafés
The data fragmentation challenge
Avoiding the mistakes of NPfIT in new NHS IT contracts
Whiteboard it – the power of graph databases
Near field communication (NFC): Latest shockwave of the technological invasion
Forrester: Best practice tips for business intelligence success
A lesson in understanding your customers
Is it time for object storage to shine?
The ideology of hacking
How to lead when change is the new normal
Mobile IT could be more disruptive than anticipated
iPhone sales boosts investor confidence in Apple
Understand your security risks
How to assess the security of a cloud service provider
An evidence-based approach must underpin digital transformation
When the going gets tough, it sometimes makes sense to spend
Why the internet is forcing retailers to rethink their supply chains
Byte Night 2013: Why bigger is better
The digital silver lining for technology inclusivity
Security Think Tank: Prism fallout could be worse than security risks
Cut big data down to size
Security Think Tank: Prism is dangerous for everyone
Storage virtualisation: An old idea being revived?
BBC's DMI project failure is a warning to all organisations
Security Think Tank: Make security and compliance part of workflow to achieve balance
The challenges of information governance in our increasingly litigious age
Why companies are turning to application virtualisation
IT needs soldiers
Cloud security for SMEs: Seven key steps
Security Think Tank: Checklists are dead, long live risk-driven security
Ordnance Survey: Insurance industry can harness big data analytics
How to build a website security programme