By Jasmit Sagoo, senior director, Head of Technology UK&I, Veritas.
Read MoreBy Mat Clothier, CEO at Cloudhouse.
Read MoreDeceiving the enemy into believing one is stronger than one actually is, manipulating them into taking self-defeating actions or tricking them into believing the costs of a military raid outweigh the spoils of victory, are tactics repeatedly used in warfare throughout history. By Carolyn...
Read MoreBy Sharad Patel, data privacy expert, PA Consulting.
Read MoreBy Sion Lewis, VP of EMEA at LogMeIn.
Read MoreBy Ken Mortensen, Data Protection Officer, InterSystems.
Read MoreThere are three key components when we talk about the concept of privacy: Laws, customs and...
Read MoreThe adoption of cloud computing by businesses is progressing at an incredible rate. The cloud...
Read MoreWith or without realising, we’ve encountered the benefits of digital transformation in various...
Read MoreKeeping your software delivery in peak condition. By Jeff Keyes at Plutora.
Read MoreOften when we think about cybersecurity, especially about the impacts of breaches, our minds turn...
Read MoreToday’s business world is driven by data, enabling employees, contractors, partners and vendors...
Read More