All articles by Cbr Rolling Blog
Password Re-use: The seed of your undoing
Password re-use means that any breach at another company; any malware infection on a computer belonging to an employee or customer; or any successful phishing attack could directly affect your business.
Know your cyber security blindspots
State-sponsored cyber-attacks are tough to stop. Paul Nicholson, director of product marketing, A10 Networks, explores how organisations can remain vigilant.
When managing the mobile workforce, turn more into less…it’s more
Alan Giles, Mobility Business Unit Manager at Snow Software, looks at how to balance freedom and control when it comes to the mobile workforce.
How the public and private sector can maximise the digital economy opportunity
Rob Lamb, Cloud Business Director, EMC, discusses what actions the gov’t & businesses should take to maximise and overcome the challenges posed by the digital economy.
Privacy Shield: What to expect and why businesses must act now
Mark Thompson, Privacy Practice Leader and Ewan Donald, Privacy Advisory at KPMG, on why businesses need to identify and plug Safe Harbor gaps quickly.
What’s so scary about compatibility?
Stephen Crick, Regional Manager from ProLabs, on product compatibility and its general lack of pick-up within the networking market.
What is NFV and why should MNOs care about it?
Steve Barefoot, senior product analyst at Interop Technologies, on NFV and its numerous benefits to MNOs.
Ofcom’s 10-year digital communications review – what it should have called for?
Amid several key areas, there’s no ignoring the Openreach issue, says Alastair Masson, Client Partner, NTT DATA.
Are you ready for EU General Data Protection Regulation changes?
Tony Pepper, CEO, Egress Software Technologies, looks at how the upcoming GDPR will impact businesses.
Digital Preservation: The 10 Year Tipping Point
Jon Tilbury, CEO at Preservica, argues how companies should be concerned about what will happen to critical digital information in 10 years, not 100.