6,878 Results for:

  • Sort by: 

Manufacturing social media software: Where it makes sense

10 Mar 2011

While social networking has become a part of daily life for many people, manufacturing organizations have been slow to add social media to their businesses. Read More

APT attack on telcos highlights need for comprehensive defence

25 Jun 2019

A global cyber attack against multiple telecommunications firms underlines need for comprehensive approach to cyber defence, say researchers and industry commentators Read More

Gartner: Eight ways blockchain can support governments

04 Sep 2019

Distributed ledgers are not just limited to finance and smart contracts. Gartner explores how blockchain can tackle government inefficiencies Read More

How much are your social network connections worth?

01 Dec 2009

Businesses should use analytical methods to measure the success of social networking and the value of social network users' relationships and connections, according to analyst Gartner. Read More

Voting open for the most influential woman in UK technology 2019

15 Jul 2019

Who do you think deserves the title of most influential woman in UK technology 2019? Submit your vote now Read More

Passing the baton on Cybersecurity Skills

31 May 2019

This year will be the first time I visit Infosec with no agenda. Or to be more precise I will have a Community Safety rather than a Cybersecurity Skills Agenda. This has caused me to take a cool ... Read More

The IoT economy: New models created by connectivity

29 Apr 2019

The internet of things enables otherwise silent devices to become economic drivers. Infor Retail's Guy Courtin outlines where IoT is having a major impact on the economy. Read More

How a flaw in Apple DEP misuses an MDM server

13 Dec 2018

Hackers are able to enroll their devices in an organization's MDM server via a flaw in Apple DEP. Expert Michael Cobb explains how hackers conduct these attacks. Read More

Securing the IoT edge

15 Apr 2019

IoT security requires a consistent and comprehensive security strategy. Fortinet's John Maddison discusses five crucial elements of IoT edge security and explains how, tied together, they build a ... Read More

Phishing attacks are top employee data breach threat for HR

17 Jan 2019

HR and finance department employees are targets for more sophisticated phishing attacks. These departments collect and store valuable data that attackers want. Read More