Monday, 29 February 2016
Security Think Tank: Human factor key to access control
In the modern business environment, what are the most common access control mistakes and how best are these corrected?
What are containers and microservices?
Independently deployable bits of code can be used to build agile applications. We look at some of the main players
Security Think Tank: Ransomware defence requires focus on three key areas
What is the best strategy for business to protect against ransomware?
Bulk data collection unnecessary for surveillance, says cyber expert
Opting for bulk data collection and other intrusive surveillance overlooks other means available that do not involve collateral damage to businesses and innocent people, says cyber expert
IT companies need technical workers with soft skills
IT firms are in need of candidates with interpersonal skills, as well as specific technical focuses
Assa Abloy outsources IT transformation to Wipro
Swedish lock maker has outsourced its IT infrastructure to Indian IT services firm
SaaS provider rejects “costly” VMware for Nutanix Acropolis hypervisor
Data services provider Pi rejects VMware as too costly and complex, opting for Nutanix’s computing and storage Acropolis hypervisor
Subscribe to:
Posts (Atom)