The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreThe enterprise data protection market still leverages a traditional approach to solving the increasingly complicated enterprise requirements. Solutions range from on-premises traditional…
Read MoreTechVets is a newly launched social enterprise in the UK, which “provides a bridge for veterans and service leavers into cyber security…
Read MoreUnless you avoided reading or listening to the news last year (and with everything going on in the world who can blame…
Read MoreOnly a fool would dare criticise the report “The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation,” coming as it does…
Read MoreIn the land of lies, damned lies and statistics, the insurance industry may be one of the more trustworthy sources. After all,…
Read MoreRecently I’ve been asking friends, colleagues and clients what they think are the most important unanswered questions in tech. I thank Ian…
Read MoreGet the latest strategies in enterprise mobility, security, BYOD, and deployed devices in our 45 minute Twitter chat #MobilityTalk on 12/7 at 1:00…
Read MoreArtificial Intelligence (AI) presents a significant opportunity to solve problems previously either not easy to solve or worse, not possible to solve.…
Read MoreSince Stuxnet, attacks have become more dangerous…
Read MoreFinalCode has some dire predictions for those dealing with evolving infosec threats…
Read MoreA couple of weeks ago I met with the email management and security vendor Retarus. While I was unfamiliar with the company…
Read MoreHowever, with DDoS attacks, there is a common theme, one established in the reality that there is not much difference between a 300 Gbps, 500 Gbps and a 1 Tbps attack…
Read More