
Top methods for preventing container misconfiguration
IT decision-makers should focus on strategizing better and only transitioning what is essential for the new environment. This includes transforming assets to reduce complexity, human

SASE: Understanding Secure Access Service Edge
What is Secure Access Service Edge (SASE)? Secure Access Service Edge (SASE), pronounced as «sassy,» is a cloud architecture model that integrates network and cloud-native

Potential Negative Impact of AI on the Environment Could Cancel Out Sustainable Advantages
Artificial intelligence (AI) has the potential to aid companies in measuring and improving their sustainability efforts, but the significant environmental impacts of the technology itself

The 5 Key Cybersecurity Risks and Challenges Facing Supply Chains
Supply chains are vulnerable to cyber attacks due to their complexity and reliance on partnerships. Security leaders must recognize that the security issues of supply

Labour vows to enhance digital infrastructure in 2024 general election
The Labour Party manifesto for the 2024 general election pledges to support the tech and digital sectors by implementing a new industrial strategy and reforming

Is data leakage preventable in the cloud?
As organizations increasingly store and process data in the cloud, there is growing concern among administrators, data owners, and CISOs about potential misconfigurations or mishaps

The Black Basta ransomware group could be leveraging a Microsoft zero-day vulnerability
Users have been warned that a vulnerability in the Microsoft Windows Error Reporting Service, known as CVE-2024-26169, was exploited as a zero-day by the Black

Decline in diversity and inclusion in tech industry highlighted in TTC report
The Tech Talent Charter (TTC) has highlighted concerning trends in the tech industry regarding diversity, equity, and inclusion (DE&I). Despite progress in the past five

Interview with the CIO: Advancing in your career and aligning with business goals
Ash Cooper, who started his career in IT over 20 years ago in PC support, unexpectedly found himself as the CIO of FTSE 100 law

CMA’s Working Paper Raises Concerns Over Microsoft’s Dominance in the UK Cloud Market
Experts have warned that the Competition and Markets Authority’s (CMA’s) current investigation into Microsoft’s cloud software licensing strategy should be concerning for the company. Despite

Understanding Erasure Coding: A Comparison to RAID
Erasure coding (EC), a method of data protection, involves breaking data into fragments, expanding and encoding them with redundant pieces, and storing them across multiple

Understanding Privacy Impact Assessments (PIAs)
What is a privacy impact assessment? A privacy impact assessment (PIA) is a method used to identify and evaluate privacy risks throughout the development lifecycle