Category

Cybersecurity

The threat of cybercrime is real and a massive concern for organisations large and small. The huge weight of responsibility to fend off attacks falls firmly on the shoulders of IT leaders. This section explores the latest cyber security security news and trends with expert insight and analysis from IT professionals from around the world.

DDoS ransom notes: why paying up will get you nowhere

Cybersecurity

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

The ripple effect of identity theft: what happens to my data once it’s stolen?

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Communications & Networking

How to protect against insider threats while maintaining employee trust

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Windows Server 2003 – the hidden timebomb

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

How to leverage user behaviour analytics for insider threat profiles

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Are social recognition tools secure enough for mobile payments?

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Shadow IT is a reality but it doesn’t have to keep your organisation in the dark ages

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

5 years of cybercrime: where we’’ve been and where we’re going

Cybersecurity

Shadow IT is a reality but it doesn’t have to keep your organisation in the dark ages

Cybersecurity

5 years of cybercrime: where we’’ve been and where we’re going

Cybersecurity

Burying your head in the sand: a good security strategy for ostriches, not organisations

Cybersecurity

Eight practical steps to handling a security incident

Cybersecurity

The human factor: top tips to strengthen the weakest link in the information security chain

Cybersecurity

How to be a security policy management saint, not a sinner

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Business & Strategy

How the financial services C-suite are going beyond ‘keeping the lights on’ in 2025

Michael Perica, CFO at Rimini Street discusses the impact of a more colaborative relationship between CFOs and CIOs

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Partner Content

Is your business ready for the IDP revolution?

Make your organisation more efficient with Intelligent Document Processing (IDP). David Malan, sales director of DocuWare, explains more

Partner Content

Tips for making sure your AI-powered FP&A efforts are successful

AI has the potential to make business finance modelling projects more efficient and impactful, but only with the right approach

Partner Content

Would you let an AI robot handle 90% of your meetings?

Zoom's founder believes AI clones could attend meetings on our behalf. Aoibhinn McBride of Jobbio explores AI in the workplace