Category

Cybersecurity

The threat of cybercrime is real and a massive concern for organisations large and small. The huge weight of responsibility to fend off attacks falls firmly on the shoulders of IT leaders. This section explores the latest cyber security security news and trends with expert insight and analysis from IT professionals from around the world.

How Iranian hackers blew a hole in Gmail’s two-step verification

Cybersecurity

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Continuous monitoring vs Black Hat hackers – which should you rely on to identify web security issues?

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

The checklist for enterprise mobile apps that are flexible yet secure

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Why privacy concerns will hinder trust in the Internet of Things

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Why understanding the lifecycle of a cyber attack is better than trying to stop it

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

C-suite take note: there is more to IT security than keeping you safe

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

How IT security can deal with threat information overload

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

The critical difference between SIEM and UBA – and why you need both to combat insider threats

Cybersecurity

How IT security can deal with threat information overload

Cybersecurity

The critical difference between SIEM and UBA – and why you need both to combat insider threats

Cybersecurity

Why the healthcare industry badly needs a cyber security health check

Cybersecurity

Ashley Madison hack: Top 10 reactions from those exposed in the mass data leak

Cybersecurity

The seven steps to stopping e-commerce fraud in its tracks

Cybersecurity

What the US military can teach CEOs about building a cybersecurity haven

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Business & Strategy

How the financial services C-suite are going beyond ‘keeping the lights on’ in 2025

Michael Perica, CFO at Rimini Street discusses the impact of a more colaborative relationship between CFOs and CIOs

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Partner Content

Is your business ready for the IDP revolution?

Make your organisation more efficient with Intelligent Document Processing (IDP). David Malan, sales director of DocuWare, explains more

Partner Content

Tips for making sure your AI-powered FP&A efforts are successful

AI has the potential to make business finance modelling projects more efficient and impactful, but only with the right approach

Partner Content

Would you let an AI robot handle 90% of your meetings?

Zoom's founder believes AI clones could attend meetings on our behalf. Aoibhinn McBride of Jobbio explores AI in the workplace