Blogs

Using data to enhance your enterprise cyber hygiene

Jim Doggett, US VP and CISO, Panaseer In the good ‘ol days of CISO, things were straightforward and it was pretty easy to do what it took to be successful. I would prepare a budget for the upcoming year from a list of e...

The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including: m...

Cloud technology is becoming more utilised in the workplace

By Angela Evans, Office Business Leader at Microsoft UK “In recent years, the cloud has undoubtedly established itself as a key cog in the enterprise IT wheel. With clear benefits in data storage, security and r...

Incident response: a six-step guide

Tim Bandos, Senior Director of Cybersecurity at Digital Guardian, discusses how good incident response always starts with answering six key questions. Incident response is defined as the process by which an...

How to derive value from ‘pay as you go’ cloud

Source: Rob Mellor, VP GM EMEA, WhereScape If you’ve ever had the joy of watching eight-year olds play football, you’ll have witnessed a particular parent on the sidelines; not content with simple encouragement, they bel...

Has cloud killed the in-house data centre?

As worldwide spending on cloud services skyrockets towards $141 billion by 2019, traditional in-house data centres seem to be evaporating. In 2005, 90% of data centres were enterprise-owned, but by 2020 IDC believes...

Browse our latest issue

Intelligent CIO Europe

View Magazine Archive