Monday, 29 February 2016

Security Think Tank: Human factor key to access control

In the modern business environment, what are the most common access control mistakes and how best are these corrected?

What are containers and microservices?

Independently deployable bits of code can be used to build agile applications. We look at some of the main players

Security Think Tank: Ransomware defence requires focus on three key areas

What is the best strategy for business to protect against ransomware?

Bulk data collection unnecessary for surveillance, says cyber expert

Opting for bulk data collection and other intrusive surveillance overlooks other means available that do not involve collateral damage to businesses and innocent people, says cyber expert

IT companies need technical workers with soft skills

IT firms are in need of candidates with interpersonal skills, as well as specific technical focuses

Assa Abloy outsources IT transformation to Wipro

Swedish lock maker has outsourced its IT infrastructure to Indian IT services firm

SaaS provider rejects “costly” VMware for Nutanix Acropolis hypervisor

Data services provider Pi rejects VMware as too costly and complex, opting for Nutanix’s computing and storage Acropolis hypervisor