Security Think Tank: SQLi attacks fly under security testing radar
Storage arrays face two-pronged flash/cloud attack
Security Think Tank: Quick time to market to blame for many SQLi attacks
Security Think Tank: Development and testing key to reducing SQLi attacks
Negotiating BPO contract termination in local government
Protecting your business from copyright infringement
Forrester: Five key trends for your cloud journey
Reducing your online risk exposure to cyber attacks
How to survive a data breach
Hacking open data on development aid
Technology innovators are critical for growth
Does Microsoft need to change its policy on Windows upgrade pricing ?
BYOD V.2 and spotting the next big trend
Business consulting – the next battleground in IT services
Business intelligence and analytics: how to develop a complementary strategy
Preparing your teams for software defined networking
Why IT leaders should adopt a venture capitalist approach
In an age of subscription services, ERP is dead
Security Think Tank: Six questions to ask about security and virtualisation
440 million reasons to learn three IT risk lessons
Security Think Tank: Virtualisation raises three main security issues
How cloud vendors can sell to the banks
Security Think Tank: Configuration is key to virtual security
Security Think Tank: Virtual security more than just technology
Security Think Tank: Security in the virtual world still not 100%
Security Think Tank: Security in virtual world requires special considerations
RBS and the high cost of failures to business reputation
Security Think Tank: Hypervisor is key to securing virtual servers
Has going public lost its appeal?
Why are we making 'lose-lose' technologies?
Addressing the IT gender imbalance with courage and collaboration
To be open or not to be – that is the question
Forrester: How to build a security change plan
Are you up to speed with business relationship management?
Forrester: Networking predictions for 2013
The importance of trialling before buying
EU court legalises second-hand software
Getting the most from public sector data
BYOD: Businesses must be clear on data privacy
Project management: People make projects
The history of the next-generation firewall
Security Think Tank: Flame shows why risk management is a business essential
Security Think Tank: Flame – proceed with caution
Tackling the challenges of the next-generation firewall
Tech companies facing mounting IP challenges
Ovum view: The future of software development
Security Think Tank: Security reviews are in order post Flame
As cheap as chips: turning the 'internet of things' into business benefits
Security Think Tank: Are companies too confident about targeted attacks?
Security Think Tank: Flame a good reason to keep up with emerging threat analysis
Security Think Tank: Flame is an opportunity for businesses to reassess defences
Security Think Tank: Flame – business must prepare for the unpredictable
How a flash array could have limited RBS damage
Why IT contractor salaries are rising
Enterprise log managers: An unsexy but vital tool
Can Nokia's 'next billion' strategy save the company ?
Delivering social change through crowdsourcing
Security Think Tank: The only sustainable approach to security is intelligence-led
Security Think Tank: Intelligence-led security demands planning ALREADY USED
Why the Data Communications Bill is proportionate, measured and necessary
Security Think Tank: Intelligence-led security could give IT pros the edge
Security Think Tank: Proof of intelligence-led security is in the metrics
Security Think Tank: Using big data for intelligence-led security
Security Zone: IT and protective services convergence
Security Think Tank: RASP – a must-have security technology
Security Think Tank: Intelligence-led security is about risk management
Security Think Tank: Intelligence-led security is more efficient and effective
Growing out of the socially awkward phase: how marketing and IT can work better together
Security Think Tank: Security intelligence needs a plan
Six steps to plan and prioritise IT investments
Has EMC missed out on the hybrid flash array?
Security Zone: Patch me please
Byte Night 2012: 15 years in the making
Cookie consent: Preparing for the compliance crunch
Cloud choices: How to select the right hosted services
The problem of legacy humans in technology projects
History lesson points way forward on data management projects
Security Think Tank: Outsource only run-of-the-mill security functions
Security Think Tank: Effective management essential for IT security outsourcing
Security Think Tank: Three considerations to outsourcing IT security
Security Think Tank: IT security outsourcing should be informed and risk-managed
Security Think Tank: Effective quality control key to security outsourcing
Security Think Tank: Business cannot outsource accountability
IT careers: Why relationships are everything
Security Think Tank: No one-size-fits-all approach to security outsourcing
Security Think Tank: Start with capability gap when outsourcing security
Why great companies die - repeatedly - and is Microsoft next?
Professionalising service management will help IT take its seat at the top table
Security Think Tank: Outsourcing of IT security is not for everyone
Why the public sector is turning to multi-sourcing
The carping of naysayers harms the wielding of influence
Time to assess the value of the data you hold
Forrester: Innovation In Outsourcing Relationships
Leveraging the benefits of ‘Big Data’
Emerging markets: The future home of IT spend?
Bigger drives mean the RAID rebuild must become a thing of the past
Three key considerations to deliver benefits from big data
Government open standards proposal fails the 'so what?' test
Open standards are about the business model, not the technology
Security Zone: Business continuity: putting the plan to work
More