These days, users are not fixed to a specific location or PC – so software should not be either (The unspoken software licensing debacle, jasonslater.computing.co.uk). Although many people have laptops...
It was a hotly-contested year - here are the companies that made it big on the night
Former black hat hacker discusses his career hacking enterprises, and how he turned himself into a force for good (mostly)
Whether it is because of legal risks, reputational damage or concerns over business continuity, reporting cyber incidents is rare and pursuing them legally is even more so
Need board support for IT security investments? Think about who they really are first, advises Kier CIO Duncan Stott
Understanding board members can help when making IT security pitches to them, says Stott