2014 was a year in which information security vaulted into the public eye, driven by a surge in both the number and the visibility of data breaches and compromises. This new attention will bring greater scrutiny in 2015, just as the nature and severity of threats continue to evolve for the worst.
Read MoreThe Identity and Access Management (IAM) Market continues to grow, with analysts predicting a significant continued increase in spending from enterprises large and small. As 2014 draws to a close, we take a look at the key factors driving this investment and make our predictions for how the IAM market will continue to evolve in 2015, says By Colin Miles, CTO Pirean.
Read MoreIT is a revolving door of change. While most industries have had to get on board with the digital revolution, few have actually had to be the ones to underpin it all. The best and most expensive applications in the world are next to useless if the networks supporting them all aren’t resilient, reliable and configured for change. Here we take a look at the importance of securing your network, as well as the key to making the most of the relationship with your service provider. So what do...
Read MoreMobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015, antivirus software provider Bitdefender warns.
Read MoreRichard Potter, Group Innovation Director at Steria, offers his technology predictions for 2015 and beyond.
Read More