In today’s interconnected digital world, there are increasingly blurred lines between an organisation’s IT infrastructure and that of its closest partners so understanding your vendor landscape is critical. By Matthew McKenna, VP EMEA at SecurityScorecard.
Read MoreRetail is one of the most challenging sectors in the UK right now, particularly with the collapse of the British high-street regularly splashed across the front pages. No matter whether a shop front is online or a physical store, all retailers are finding themselves facing the challenge of digital transformation and effective use of technology has become a key differentiator for those that will thrive. Many retailers are harnessing the power of technology to deliver improved employee user...
Read MoreTechnology is one of the few things in life we expect to just work. This is especially true when it comes to artificial intelligence (AI), which is a driving force behind today’s digital transformation. According to recent KPMG research, enterprises will spend an estimated £177 billion on intelligent automation technologies by 2025, with 49% of companies putting it to use in just three years. And that’s for good reason. By Ryan Lester, Director of Customer Engagement Technologies at...
Read MoreMalware authors have always been trying to update their software and evolve their techniques in order to take advantage of new technologies and bypass security measures. By Leonidas Plagakis, Security Engineer, RiverSafe.
Read MoreBecrypt has been in the disk encryption business for more than 15 years and have carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time, driven by regulation such as GDPR, and those that require encryption as part of the privacy enforcing mechanisms. By Bernard Parsons, CEO, Becrypt.
Read MoreWhilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of the approach have been quietly adopted and applied within some sensitive government IT environments. By Bernard Parsons, CEO, Becrypt.
Read More