CIOs at some major global banks don't just want to security certify routers and other major items of communications and computing equipment - but the components inside, according to Gartner analyst Peter...
Confidence in the defences and using backup data to test and assess is key to standing up to the latest criminal demands
Zoom's new end-to-end encryption uses the same 256-bit AES-GCM encryption used to secure Zoom meetings
Rising technology adoption also increases complexity and lowers estate visibility. This webinar will discuss how organisations can handle their inceasingly disparate IT estates
Overworked service desks are no substitute for skilled IT professionals optimising the solutions they helped to build
AI in defence, Robots in government, AI/ML: the RoI question, the coming role of the Dark Net in everyday life, ask a CIO ... and more