Blogs

How AI-based machine learning will affect IT security

Article by: Rabih Itani, Regional Business Development Manager – Security, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company Artificial intelligence (AI) has been a hot topic of discussion in...

Will businesses be ready in time to comply with the GDPR requirements?

Article by: Bob Worrall, CIO, Juniper Networks On May 25 2018, the General Data Protection Regulation (GDPR) becomes fully enforceable under law, but will organisations be ready to comply by this deadline? Re-read this...

How to prepare your colocation with open compute solutions

With a 17% attendance increase at the 2018 Open Compute Summit last month, the increasing market interest in all things open compute came through loud and clear. Previously, the unique and custom IT gear shared via...

Using data to enhance your enterprise cyber hygiene

Jim Doggett, US VP and CISO, Panaseer In the good ‘ol days of CISO, things were straightforward and it was pretty easy to do what it took to be successful. I would prepare a budget for the upcoming year from a list of e...

The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including: m...

Cloud technology is becoming more utilised in the workplace

By Angela Evans, Office Business Leader at Microsoft UK “In recent years, the cloud has undoubtedly established itself as a key cog in the enterprise IT wheel. With clear benefits in data storage, security and r...

Browse our latest issue

Intelligent CIO Europe

View Magazine Archive