adv

Blogs

Stefan Hammond

Are password managers secure?

None of us can remember all our passwords. Yes, we know to use strong passwords, and we never use...
Stefan Hammond

PopVote, CloudFlare trump DDoS attack

Popular events on the Internet tend to jam channels solid. Rugby Sevens tickets, collectible dolls...

Opinions

Bob Butler, chief security officer, IO

Where is your data and who has access to it?

"Data Sovereignty" and "Data Custody" -- words you hear more and more in the boardroom, but what do...
How companies can take advantage of the MOOC revolution

How companies can take advantage of the MOOC revolution

Udacity, one of the leading online education startups, just raised a further $35 million dollars....

Sponsored Content

Since IT systems churned out bits and bytes, businesses have always looked at the best ways to house data. But big data, which forced businesses to view data as hidden gems of information, has turned...
While 3G and 4G mobile networks are commonplace today, the general surge to be wireless is continuing to drive Wi-Fi usage as consumers and workers demand wireless access at all times in all...
The loss and recovery of data have been intertwined with IT since the inception of the computing age, from punch cards through to floppy disks and solid state storage - as is the frustration of...
Developed by Belgian visualization major Barco, ClickShare is a revolutionary collaboration tool that facilitates deeper involvement and sharing of content by all the participants in a meeting...

Featured Story

4 tips to help CIOs land a seat on the board
To make the jump from IT to a corporate board, CIOs have to change their thinking. Their mission is no longer all about IT projects, ROI or uptime....
How big data is helping to save the planet
How big data is helping to save the planet
A little more than a year ago, Conservation International (CI) was wrestling with a mammoth big...
IT leaders aren't all coming from tech
IT leaders aren't all coming from tech
The milestones along the traditional path to IT leadership look a lot like this: Earn a computer...
iOS 8 fixes enterprise Wi-Fi authentication hijacking issue
iOS 8 fixes enterprise Wi-Fi authentication hijacking issue
Apple's iOS 8 addresses a serious weakness that could allow attackers to hijack the wireless...

Events