At this digital roundtable – alongside your peers and in partnership with Equinix – you will get the chance to discuss how well your business continuity plans have held up through the pandemic, what has changed and what you will keep after the crisis has dissipated.
Left unpatched, this command injection flaw could allow attackers to take control of a virtualized cloud infrastructure.
During this Digital Big Conversation you will learn about the wider industry headwinds which are shaping enterprise infrastructure of the future and how AMD itself is changing the game with its multicore EPYC platform, allowing customers to squeeze more out of their existing data centre envelope at a lower total cost of ownership.
The CIO 100 is a showcase of the crucial technology projects, IT strategies, innovations, ideas, change management and transformation initiatives CIOs in and from the UK are delivering to customers, organisations, partners and sectors.
The inaugural CSO30 is a celebration of the role of the CSO and recognises the leading security executives in the UK.
Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network.
Earlier response to the WannaCry crisis has helped create an infrastructure where UK healthcare organizations get better security support and threat intelligence
With the need for efficient collaboration tools exploding in recent months, a variety of companies hope to refine how those tools work and what they can do. We look at six now pushing the envelope.
Security theater is a term coined by Bruce Schneier to describe security measures that satisfy our emotional need to take action, but don’t actually improve security. Rooting these out can save considerable time and money -- and make...
Microsoft's Sysmon and Azure Sentinel are easy and inexpensive ways to log events on your network. Here's how to get started with them.
Podcast Episode 10: Listen now as Akamai CISO Andy Ellis and host Bob Bragdon continue their talk about the good guy/bad guy dynamic in the infosec community and why it can lead to being marginalized.
Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.
The COVID-19 crisis is putting security vendors, especially startups, under severe pressure. Here's how to vet their financial stability and prepare for the worst.
Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies.
Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.
Featured Sponsor HPEHow Hybrid Cloud Simplifies Data Sovereignty Challenges
Sponsored by Hewlett Packard EnterpriseThe Cost-Squeezing Effect of Hybrid Cloud Economics
Sponsored by Hewlett Packard EnterprisePay-As-You-Go Infrastructure for Your Hosted Datacenter: Introducing HPE