• Security Think Tank: SQLi attacks fly under security testing radar
  • Storage arrays face two-pronged flash/cloud attack
  • Security Think Tank: Quick time to market to blame for many SQLi attacks
  • Security Think Tank: Development and testing key to reducing SQLi attacks
  • Negotiating BPO contract termination in local government
  • Protecting your business from copyright infringement
  • Forrester: Five key trends for your cloud journey
  • Reducing your online risk exposure to cyber attacks
  • How to survive a data breach
  • Hacking open data on development aid
  • Technology innovators are critical for growth
  • Does Microsoft need to change its policy on Windows upgrade pricing ?
  • BYOD V.2 and spotting the next big trend
  • Business consulting – the next battleground in IT services
  • Business intelligence and analytics: how to develop a complementary strategy
  • Preparing your teams for software defined networking
  • Why IT leaders should adopt a venture capitalist approach
  • In an age of subscription services, ERP is dead
  • Security Think Tank: Six questions to ask about security and virtualisation
  • 440 million reasons to learn three IT risk lessons
  • Security Think Tank: Virtualisation raises three main security issues
  • How cloud vendors can sell to the banks
  • Security Think Tank: Configuration is key to virtual security
  • Security Think Tank: Virtual security more than just technology
  • Security Think Tank: Security in the virtual world still not 100%
  • Security Think Tank: Security in virtual world requires special considerations
  • RBS and the high cost of failures to business reputation
  • Security Think Tank: Hypervisor is key to securing virtual servers
  • Has going public lost its appeal?
  • Why are we making 'lose-lose' technologies?
  • Addressing the IT gender imbalance with courage and collaboration
  • To be open or not to be – that is the question
  • Forrester: How to build a security change plan
  • Are you up to speed with business relationship management?
  • Forrester: Networking predictions for 2013
  • The importance of trialling before buying
  • EU court legalises second-hand software
  • Getting the most from public sector data
  • BYOD: Businesses must be clear on data privacy
  • Project management: People make projects
  • The history of the next-generation firewall
  • Security Think Tank: Flame shows why risk management is a business essential
  • Security Think Tank: Flame – proceed with caution
  • Tackling the challenges of the next-generation firewall
  • Tech companies facing mounting IP challenges
  • Ovum view: The future of software development
  • Security Think Tank: Security reviews are in order post Flame
  • As cheap as chips: turning the 'internet of things' into business benefits
  • Security Think Tank: Are companies too confident about targeted attacks?
  • Security Think Tank: Flame a good reason to keep up with emerging threat analysis
  • Security Think Tank: Flame is an opportunity for businesses to reassess defences
  • Security Think Tank: Flame – business must prepare for the unpredictable
  • How a flash array could have limited RBS damage
  • Why IT contractor salaries are rising
  • Enterprise log managers: An unsexy but vital tool
  • Can Nokia's 'next billion' strategy save the company ?
  • Delivering social change through crowdsourcing
  • Security Think Tank: The only sustainable approach to security is intelligence-led
  • Security Think Tank: Intelligence-led security demands planning ALREADY USED
  • Why the Data Communications Bill is proportionate, measured and necessary
  • Security Think Tank: Intelligence-led security could give IT pros the edge
  • Security Think Tank: Proof of intelligence-led security is in the metrics
  • Security Think Tank: Using big data for intelligence-led security
  • Security Zone: IT and protective services convergence
  • Security Think Tank: RASP – a must-have security technology
  • Security Think Tank: Intelligence-led security is about risk management
  • Security Think Tank: Intelligence-led security is more efficient and effective
  • Growing out of the socially awkward phase: how marketing and IT can work better together
  • Security Think Tank: Security intelligence needs a plan
  • Six steps to plan and prioritise IT investments
  • Has EMC missed out on the hybrid flash array?
  • Security Zone: Patch me please
  • Byte Night 2012: 15 years in the making
  • Cookie consent: Preparing for the compliance crunch
  • Cloud choices: How to select the right hosted services
  • The problem of legacy humans in technology projects
  • History lesson points way forward on data management projects
  • Security Think Tank: Outsource only run-of-the-mill security functions
  • Security Think Tank: Effective management essential for IT security outsourcing
  • Security Think Tank: Three considerations to outsourcing IT security
  • Security Think Tank: IT security outsourcing should be informed and risk-managed
  • Security Think Tank: Effective quality control key to security outsourcing
  • Security Think Tank: Business cannot outsource accountability
  • IT careers: Why relationships are everything
  • Security Think Tank: No one-size-fits-all approach to security outsourcing
  • Security Think Tank: Start with capability gap when outsourcing security
  • Why great companies die - repeatedly - and is Microsoft next?
  • Professionalising service management will help IT take its seat at the top table
  • Security Think Tank: Outsourcing of IT security is not for everyone
  • Why the public sector is turning to multi-sourcing
  • The carping of naysayers harms the wielding of influence
  • Time to assess the value of the data you hold
  • Forrester: Innovation In Outsourcing Relationships
  • Leveraging the benefits of ‘Big Data’
  • Emerging markets: The future home of IT spend?
  • Bigger drives mean the RAID rebuild must become a thing of the past
  • Three key considerations to deliver benefits from big data
  • Government open standards proposal fails the 'so what?' test
  • Open standards are about the business model, not the technology
  • Security Zone: Business continuity: putting the plan to work
  • More