Digital ID Technology Promises Stronger Security
Despite multiple shortcomings, passwords remain the most common authentication method for accessing financial, e-commerce, healthcare, and an array of other…
Supreme court refuses Julian Assange extradition appeal
The Supreme Court has refused to hear an application by Wikileaks founder Julian Assange to appeal against extradition to…
Python removes ‘dead batteries’ from standard library
An initiative to remove outdated and unmaintained modules from Python’s standard library has been approved as Python Enhancement Proposal (PEP)…
Encryption myths versus realities of Online Safety Bill
UK politicians – just like the rest of us – rely on encryption all day, every day, to protect…
How can I avoid an exodus of cyber talent linked to stress and burnout?
IT security teams have seen unprecedented mental health challenges since the Covid-19 outbreak two years ago and the subsequent…
First female business computer programmer dies
Mary Clare Coombs, née Blood, born 4 February 1929, has died following complications arising after a Covid-19 infection. Combs…
Is low-code safe and secure?
I was intrigued by an article I read the other day in CSO Online titled “4 security concerns for low-code…
15 star founders of high-flying open source projects
Data streaming may sound dull and technical, like plumbing for the digital age. But as companies need to ingest and…
Are Universities Delivering Well-Prepared IT Graduates?
The tech talent crunch is impacting organizations of all sizes. The lack of qualified IT specialists is a rising concern…
Best-of-breed cloud ERP applications proffer a modern strategy
The enterprise resource planning (ERP) market certainly looks very different now compared with 10 years ago. Back in 2013,…