• August 21, 2017 21 Aug'17

    How to make software changes, properly

    This is a guest post for the Computer Weekly Developer Network written by Anson Kelly in his role as senior developer for independent car buying website carwow. Kelly discusses how software can be ...

  • February 03, 2017 03 Feb'17

    Experts debate effects of government cybersecurity executive order

    A leaked version of a draft of a government cybersecurity executive order from President Trump has experts debating the effects such an order would have.

  • February 01, 2017 01 Feb'17

    We need to talk ... about team chat app security

    Team collaboration applications such as Slack and Unify Circuit can make life easier for enterprises. But for some organizations, the risk might not be worth the reward.

  • January 19, 2017 19 Jan'17

    The insurmountable Catch-22 of Davos discussing technology risks

    We should take some encouragement that this week’s gathering of the powerful, the rich and the even richer in Davos chose technology risks as one of its key agenda items for discussion. The World ...

  • November 24, 2016 24 Nov'16

    Monetising free information? D&B Credit emphasises analytics and ease of use

    Freely available company information may seem a challenge to monetise. However companies like Dun & Bradstreet (D&B), Experian, Bureau van Dijk, Graydon, Equifax and Creditsafe have been ...

  • May 24, 2016 24 May'16

    Lieu, Hurd school House colleagues on cyberhygiene, defense

    Former computer science majors Lieu and Hurd wrote to their U.S. House of Representatives colleagues, urging improved awareness of cyber risks and cyberhygiene.

  • March 22, 2016 22 Mar'16

    Managing Internet of Things risks

    This week, bloggers explore management for Internet of Things risks, layered protocol stacks and TELoIP's SD-WAN offering.

  • February 16, 2016 16 Feb'16

    Beyond BYOD: How IoT and new tech are changing modern GRC

    Just as companies were getting a handle on mobility, the Internet of Things (IoT) business is officially booming: Gartner Inc. predicts there will be 6.4 billion connected "things" used worldwide in 2016. Connected consumer devices get most of the hype, but companies have been reaping IoT's data analysis benefits to streamline processes and provide increased value to customers. Connected devices raise numerous data management questions, however. As more devices are connected, it will create an unprecedented flow of data that comes with an unprecedented amount of vulnerabilities. To capitalize on IoT's business benefits, companies will have to make big adjustments to GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data governance, security and compliance processes, and strategies to take full business advantage of IoT data management.

  • December 11, 2015 11 Dec'15

    Juniper decouples SDN switch from Junos operating system

    This week, software-defined networking bloggers explore Juniper's decoupled QFX5200 switch, the basics of VXLAN and how Cisco's APIC-EM system lets users ease into SDN.

  • December 02, 2015 02 Dec'15

    IT compliance management skills remain in high demand

    As organizations' data threats and regulatory demands increase, GRC professionals are seeing their IT compliance management skill sets become highly prized across industries.