computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • IT leaders 250
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Author profile

Bob Tarzey

Articles by Bob Tarzey

Corporate

Revoke legacy privileged accounts - or pay the consequences

clock 08 March 2012 • 2 min read

Software

Facing up to the application security challenge

clock 02 March 2012 • 3 min read

Hardware

Short stories from the cloud - GoGrid, CloudBees, Attenda, City Lifeline and Xsigo Systems

clock 27 February 2012 • 4 min read

Strategy

Safe authentication for remote sys-admin tasks

clock 16 February 2012 • 1 min read

Legislation and Regulation

The secure disposal of old IT equipment

clock 14 December 2011 • 2 min read

Security

A critical software problem for banks

clock 02 December 2011 • 2 min read

Threats and Risks

Auditors want to know about individuals, not groups

clock 16 November 2011 • 2 min read

Security Technology

IT security vendors can't all be right, but they can all be wrong

clock 01 November 2011 • 3 min read

Communications

The 1985 iPhone in a truck

clock 28 October 2011 • 2 min read

Security

Data leaks: honesty really is the best policy

clock 25 October 2011 • 3 min read
234
Most read
01

Cyberattack stops all deliveries at Wiltshire Farm Foods

29 June 2022 • 2 min read
02

Dark data: "The dirty secret of the ICT sector"

27 June 2022 • 8 min read
03

Eco-warriors: Microsoft Azure vs Amazon AWS on sustainability

29 June 2022 • 12 min read
04

Apple accused of harming browser engine diversity

28 June 2022 • 3 min read
05

Remove TikTok from Apple and Android app stores, urges US official

30 June 2022 • 3 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US

© The Channel Company EMEA
New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration number 14078896