American cloud companies must verify the identity of foreign people that use their services.
Microsoft's director of identity security is urging customers to do some security house cleaning: deploy multi factor authentication and tighten up pe...
How Coca-Cola European Partners moved to modern management and a digital, mobile workforce.
With a new CEO beginning to put into practice its plan, mainly a pivot towards business, mobile operator Three UK has been eyeing up new opportunities...
Technologies to help you stay productive amidst the app overload.
What does the future of work really look like? Unlock the full potential of cloud-based solutions.
Some 65% of businesses in the region have adopted at least one Asian-made technology product, with another 72% describing vendors from the region as b...
The nation state group that attacked SolarWinds in December got inside Malwarebytes by exploiting privileged access to its Microsoft Office 365 tenant...
They also expect remote working to continue.
Fueled by vendor innovation, interest in 5G wireless networks and edge computing is growing, but IT leaders must first evaluate the cost and efficacy...
In response to complaints about Red Hat's latest plans for CentOS Linux, Red Hat will start offering no-cost Red Hat Enterprise Linux for small produc...
Want to avoid having your online accounts hacked? Enable two-factor authentication, a crucial security measure that requires an extra step when signin...
Cloud is more important than ever especially in the Covid-age. Businesses must be prepared.
You might still have a Hitachi television at home or perhaps even a briefcase-style retro radio from the 1980s… but these days the company wants to be...
The Covid-19 pandemic has highlighted the flaws in the UK's digital government set-up. The appointment of new IT leadership presents an ideal opportun...
The two most mentioned advantages of cloud-based platforms are pay-per-use billing and the ability to scale up to an almost unlimited number of resour...
Microservices are at the heart of many cloud-native architectures, using tools such as Kubernetes to manage service scaling on demand. Microsoft has b...
Why helping distressed buyers is the only way vendors will survive in a virtual first world.
Annual survey of IT leaders finds network security is of prime concern as most companies continue with work-from-home policies
Every year, cybersecurity experts start preparing for the threats that organisations and individuals may face in the year ahead. As we stare down the...
New Azure AD Investigator is now available via GitHub.
Cyber criminals know that working from home can provide them with an easier way into corporate networks - resulting in a rise in attacks targeting rem...
Citrix also reported its fourth quarter financial results, which beat expectations.
Google's first CISO explains how you avoid being owned by hackers engaged in supply chain attacks.
Microsoft releases the Windows Admin Center 2012 preview for admins to manage server clusters.
Each year, Computer Weekly launches its annual search for the most influential people in UK IT, where the tech industry nominates who it thinks should...
Asus updates its Chrome OS desktop to support 10th-generation Intel Core processors and, with its lockable VESA mount, to be capable of being hidden b...
The Wine 6.0 compatibility layer is now available with better support for running Windows games on Linux and Unix-like machines, with early support fo...
Another busy week in HR departments across the industry with some significant channel appointments being made
What's ahead for low-code: merging with collaboration platforms, pushing automation to new levels.
From smart toilets and disinfecting robots to transparent OLED displays and sleep tech, CES 2021 was a showcase for the latest innovations in consumer...
Big Blue has announced its second cloud consulting acquisition.
The abrupt move to remote working triggered a sudden rise in demand for DevOps experts.
A new study from Cloudreach and IDC entitled “Cloud Trends 2021” (registration required) surveyed more than 200 CIOs. Questions focused on the COVID-1...
How can businesses solve the productivity problem? Improved monitoring tools prove critical.
While executing these tips may be met with minor roadblocks in the initial stages, your business will certainly have a better time managing employees...
Next-generation network to offer key regional hub migration of legacy applications to support increased passenger capacity, reliability and ease of ex...
The approach to digital public services needs to be reinvented to catch up with global leaders, according to new research
SAP issued its 2021 outlook as it aims to move its customer base to the cloud. Julia White will be chief marketing and solutions officer at SAP. She p...
Kristie Grinnell is Global CIO and Chief Supply Chain Officer at General Dynamics Information Technology, and her philosophy isn’t just “cloud-first,”...
Desktop Metal hopes to secure a global presence in the 3D printing market through the deal.
Apple's HomeKit may be more privacy focused than Amazon or Google's alternatives, but how can you get it to support more devices?
Founded in 2012, the Wolox team specializes in integrated services including digital business design, product creation and agile squads.
In 2021 Trend Micro predicts that cybercriminals will look to home networks as a critical launch pad to compromising corporate IT and IoT networks.
Google Cloud Platform (GCP) is the most performant public cloud infrastructure-as-a-service (IaaS) provider for running online transactional processin...
Confidence in the public cloud is growing, but challenges persist.
Remembering passwords is hard, which is why more than 50% of users have reused passwords across...
Software has transformed every business discipline. For companies trying to increase agility,...
A combination of factors is driving more companies to digital transformations within cloud-based...
The BlackBerry® Cylance® 2020 Threat Report contains a broad range of topics vital to the...
Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization...