Insights

Taking the fast lane to GDPR compliance with data encryption

Article by: Steve Armstrong, Regional Director UK, Ireland & South Africa at Bitglass The vast majority of business enterprises are now using cloud services in some form, swayed by the promise of more efficient IT ...

Preparing for the future: Supporting data science as an art

Article by: Dr. Jabe Wilson, Consulting Director of Text and Data Analytics at Elsevier The idea of programming and data science as an art is not new. The ideology can be traced back to the founding of computer...

Leveraging tools that support innovation and differentiation is critical

Enterprises must embrace innovation and enable developers, by providing them with the tools and flexibility they need to create new business models and support new application types. It’s the era of containerisation a...

Red Hat expert on the top five ways that DevSecOps isn’t like sport

Mike Bursell, Chief Security Architect, Red Hat, discusses the similarities – and big differences – between DevSecOps and sport. There’s the World Cup, cricket, baseball, rugby, Wimbledon – more sport around at the moment ...

Attackers could use heat traces left on keyboard to steal passwords

Tomas Foltyn, Security Writer at ESET, outlines details of an attack called ‘Thermanator’, which could use your body heat against you in order to steal your credentials or any other short string of text that you have typ...

Are physical security features still needed on identity documents?

Article by: Vincent Gourmelen, ID Card Solutions Product Manager, Citizen Identity Solutions At a time of strong data encryption, on-chip biometry checks, digital signatures or national public key directories (N-PKD),...

Browse our latest issue

Intelligent CIO Europe

View Magazine Archive