Category

Cybersecurity

The threat of cybercrime is real and a massive concern for organisations large and small. The huge weight of responsibility to fend off attacks falls firmly on the shoulders of IT leaders. This section explores the latest cyber security security news and trends with expert insight and analysis from IT professionals from around the world.

How to protect the IT supply chain from cyber attacks

Cybersecurity

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

4 reasons why people should stop associating open source with a lack of security

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Asia-Pacific

Security bug in Australia’s online voting system throws doubt on Britain’s digital election goal

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Insider threat programmes set to double as security breaches persist

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Wanted: a business-literate CISO to prevent the next target-sized breach

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

How to protect industrial systems from malware and targeted attacks

Maintaining the reliability and safety of industrial processes requires reliable protection of its ICS against all hazards, including cyber threats.

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Why bad passwords aren’t the problem – it’s the people who make them

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

1 BILLION records of personally identifiable information were leaked in 2014, Android to blame

Cybersecurity

Why bad passwords aren’t the problem – it’s the people who make them

Cybersecurity

1 BILLION records of personally identifiable information were leaked in 2014, Android to blame

Cybersecurity

The new breed of internet service provider: frontline of cyber security

Cybersecurity

Twelve tips to combat insider IT security threats

Cybersecurity

Apple leaves customers in the lurch as services go down throughout the world – has it been hacked?

Cybersecurity

Protecting healthcare records from cyber attacks is a game of cat and mouse

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Business & Strategy

How the financial services C-suite are going beyond ‘keeping the lights on’ in 2025

Michael Perica, CFO at Rimini Street discusses the impact of a more colaborative relationship between CFOs and CIOs

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Partner Content

Is your business ready for the IDP revolution?

Make your organisation more efficient with Intelligent Document Processing (IDP). David Malan, sales director of DocuWare, explains more

Partner Content

Tips for making sure your AI-powered FP&A efforts are successful

AI has the potential to make business finance modelling projects more efficient and impactful, but only with the right approach

Partner Content

Would you let an AI robot handle 90% of your meetings?

Zoom's founder believes AI clones could attend meetings on our behalf. Aoibhinn McBride of Jobbio explores AI in the workplace