
Interview with the CIO: Advancing in your career and aligning with business goals
Ash Cooper, who started his career in IT over 20 years ago in PC support, unexpectedly found himself as the CIO of FTSE 100 law

CMA’s Working Paper Raises Concerns Over Microsoft’s Dominance in the UK Cloud Market
Experts have warned that the Competition and Markets Authority’s (CMA’s) current investigation into Microsoft’s cloud software licensing strategy should be concerning for the company. Despite

Understanding Erasure Coding: A Comparison to RAID
Erasure coding (EC), a method of data protection, involves breaking data into fragments, expanding and encoding them with redundant pieces, and storing them across multiple

Understanding Privacy Impact Assessments (PIAs)
What is a privacy impact assessment? A privacy impact assessment (PIA) is a method used to identify and evaluate privacy risks throughout the development lifecycle

Reviving the zombie subscriber population: Nordic innovators take charge
The rise of zombie subscribers, active accounts that people unknowingly pay for, has been fueled by consumers’ eagerness to consume content across various platforms. Nordic

Ensuring the Safe and Secure Use of Public Cloud Services
The public cloud, a model of cloud computing that allows remote access to resources like applications and data storage, comes with its own set of

RCE Vulnerability and DNS Zero-Day Lead Patch Tuesday Bug List
In Microsoft’s June Patch Tuesday update, a critical remote code execution (RCE) vulnerability in Microsoft Message Queuing (MSMQ) was identified as the most serious issue.

Hidden IT Witness Plays Supporting Role in Post Office Court Battle
A barrister representing the Post Office in a High Court legal battle stated that if a tainted Fujitsu expert witness had been called, lawyers for

Former Senior Officer Alleges PSNI Ran Secret Unit to Monitor Phones of Journalists and Lawyers
Former PSNI assistant chief constable, Alan McQuillan, has recently revealed that a clandestine unit within the Northern Irish police force was set up to monitor

Hackers breach Pure Storage’s Snowflake credentials
Pure Storage has become the latest victim of the Snowflake credentials breach, where cyber criminals gained access to a data analytics workspace containing customer information.

A comprehensive understanding is essential for effective cloud security
In order to successfully build or migrate to cloud technologies, incorporating security into the process early on is essential. Whether you are just starting to

Over 160 Snowflake Customers Affected by Targeted Data Theft Attack
Mandiant recently issued a warning to Snowflake customers, urging them to prioritize basic credential hygiene in light of a targeted campaign by a financially motivated