News

Reduce the risk of losing valuable information with file locking. But how should you approach it? We'll show you what you ...
Despite complexity and cost, it's certainly worth devoting time to your organisation's cyber resilience strategy. Here's what ...
With ransomware attacks, it's a case of when (not if) you'll be hit and, crucially, how long recovery takes. Here's how to ...
Over the last decade, the complexity of IT ecosystems and sophistication of cyber threats have escalated to new heights. This evolution has intensified the need for IT and security teams to ...
Too often when building anything with a technology focus, the method is to buy the new shiny market tools. However, if you are to build an adaptable, cost-efficient and scalable data platform, you ...
Over the past twelve months, we’ve witnessed a wave of rapid transformation across the technology landscape, driven by the increasing pervasiveness of AI. As a result, the dynamics of the relationship ...
Why is it risky for large banks to rely on their legacy controls? We speak to Alex Hammond, partner at Airwalk Reply, to find out Progress in large, established banks can be slow, with an infinite ...
More and more organisations are shifting from hyperscale public cloud computing to multi-cloud and other strategies, explains Nick Martindale Cloud computing – hosting and running applications, data ...
Today’s reality of health apps, fitness trackers, health monitoring devices, and cyber attacks were unimaginable at the time. Despite repeated updates, it’s not clear whether the protections that ...
Artificial intelligence (AI) is impacting almost every industry, and insurance – and the insurtech sector on which it depends – is no exception, with applications benefiting both customers and ...
Government funding is to be aimed at digital skills training across high-growth UK sectors including green energy and construction In line with the government investment package, UK colleges and ...
A strong cybersecurity threat monitoring strategy that evolves with current and prospective threats is crucial towards long-term company-wide protection Monitoring threats is an ongoing, mountainous ...