Will the consumer IT revolution sweep away corporate data privacy?

clock

Phil Evans, VP for EMEA at Datacastle, examines the expanding market in data protection technology and the emerging issues driving this trend

The implications of recent Gartner predictions are clear; consumer-IT technology is loosening business's grip on workforce practices and sensitive data. By 2012, 73 per cent of the enterprise wo...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
University CIO: 'We were owned in 4 hours'

Threats and Risks

And that certainly focused minds, says Salford University’s Mark Wantling

clock 20 March 2024 • 5 min read
Exclusive: Behind the scenes of DWP's ambitious tech transformation

Government

Modernising Europe’s biggest IT estate

clock 13 March 2024 • 5 min read
'It just suddenly narrows at the top': Advice for women seeking the C-suite

Leadership

Focus on doing the right thing – not the easy thing

clock 06 March 2024 • 4 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

UK sanctions China-based hackers

UK sanctions China-based hackers

Attackers were targeting voters and politicians

clock 28 March 2024 • 3 min read
Russian cyber spies target German politicians in sophisticated phishing attack

Russian cyber spies target German politicians in sophisticated phishing attack

Germany's cyber agency BSI warned that state-backed hackers aimed to establish long-term access to German political networks

clock 25 March 2024 • 3 min read
Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

US researchers find baked-in flaw

Graeme Burton
clock 22 March 2024 • 2 min read