Bringing Shadow IT Into the Light
Shadow IT is the unauthorized use of software, hardware, and cloud services. Typically, users skirt official IT channels in order…
4 Steps to Bolster Cybersecurity Defenses Throughout IT/OT Convergence
Over the past three decades, companies have witnessed the gradual merging of IT and operational technology (OT) — better known…
Career roadmap: Machine learning scientist
Like machine learning engineers, machine learning scientists are in high demand in today’s job market. That’s because organizations are eager…
Microsoft shows inflation-busting growth, driven by cloud adoption
Microsoft has posted revenue of $49.4bn for the quarter ending 31 March 2022, an increase of 18% over the…
Deep learning for countering energy theft
Thank you for joining! Access your Pro+ Content below. April 2022 Royal Holloway: Deep learning for countering energy theft Energy…
Emotet tests new tricks to thwart enhanced security
TA542, the cyber criminal nexus suspected of operating the Emotet botnet, seems to have used a recent period of…
Digital begins in the boardroom
What does it mean for a business to be truly digital? It’s a concept that’s easy to talk about,…
Why it makes sense to use best-of-breed SaaS to power a business strategy
The key to a successful hybrid IT strategy is to ensure it fits with your business needs, first and…
5 tools to rule your software development life cycle
Software development has come a long way in the last 30 years. I remember when you could manage the software…
5G is important to cloud computing (but not that important)
We’ve talked about 5G for so long that we’re overdue to finally see its benefits. Like many of you, I’ve…