Analysis

Tech’s Big Beasts Team Up in Bid to Defend the Open Source Oasis: Will It Be More than Hot Air?

Some of the biggest beasts of the tech world have teamed up to launch a new Open Source Security Foundation…

Avoiding DR and High Availability Pitfalls in the Hybrid Cloud

The private cloud remains the best choice for many applications for a variety of reasons, while the public cloud has…

The Eight Best SIEM Options for CISOs: A Digested Report

There will always be excellent software or IT services options that don’t fit into a Gartner Magic Quadrant; for a…

Security Management and Risk Management Will Merge

Walk into the average business and you’ll find the information security function and the risk management function in different places,…

Microsoft’s New Cryptography Suite is “Mathematically Certain” to be Secure

Microsoft has released a new cryptographic provider – an independent software module that performs cryptography algorithms for authentication, encoding, and encryption –…

Life After Libor: Using AI to Prepare Financial Contracts for the Transition

The days of LIBOR (London Interbank Offered Rate) are numbered, but the reference interest rate is embedded in millions of…

Security Teams are Treated Like Policemen: CISOs Need a Better Approach

IT security professionals play a vital role in keeping businesses safe from serious security incidents. Whether they’re actively defending against…

Software Code’s “Wayback Machine” Gets a Boost

Call it the Wayback Machine of code: a searchable open archive of software source code across iterations; from buggy beta…

Four Ways Business Leaders Can Harness the $500 Million Data Literacy Opportunity

The uncertainty around Brexit and the country’s poor performance on productivity growth is a black cloud looming over the UK.…

Mobile Banking: Trojans at the Play Store Gates?

Open Banking protocols have driven a surge in the number of new mobile-only “challenger” banks in the UK, as well…