Potential Negative Impact of AI on the Environment Could Cancel Out Sustainable Advantages
Artificial intelligence (AI) has the potential to aid companies in measuring and improving their sustainability efforts, but the significant environmental impacts of the technology itself
The 5 Key Cybersecurity Risks and Challenges Facing Supply Chains
Supply chains are vulnerable to cyber attacks due to their complexity and reliance on partnerships. Security leaders must recognize that the security issues of supply
Labour vows to enhance digital infrastructure in 2024 general election
The Labour Party manifesto for the 2024 general election pledges to support the tech and digital sectors by implementing a new industrial strategy and reforming
Is data leakage preventable in the cloud?
As organizations increasingly store and process data in the cloud, there is growing concern among administrators, data owners, and CISOs about potential misconfigurations or mishaps
The Black Basta ransomware group could be leveraging a Microsoft zero-day vulnerability
Users have been warned that a vulnerability in the Microsoft Windows Error Reporting Service, known as CVE-2024-26169, was exploited as a zero-day by the Black
Decline in diversity and inclusion in tech industry highlighted in TTC report
The Tech Talent Charter (TTC) has highlighted concerning trends in the tech industry regarding diversity, equity, and inclusion (DE&I). Despite progress in the past five
Interview with the CIO: Advancing in your career and aligning with business goals
Ash Cooper, who started his career in IT over 20 years ago in PC support, unexpectedly found himself as the CIO of FTSE 100 law
CMA’s Working Paper Raises Concerns Over Microsoft’s Dominance in the UK Cloud Market
Experts have warned that the Competition and Markets Authority’s (CMA’s) current investigation into Microsoft’s cloud software licensing strategy should be concerning for the company. Despite
Understanding Erasure Coding: A Comparison to RAID
Erasure coding (EC), a method of data protection, involves breaking data into fragments, expanding and encoding them with redundant pieces, and storing them across multiple
Understanding Privacy Impact Assessments (PIAs)
What is a privacy impact assessment? A privacy impact assessment (PIA) is a method used to identify and evaluate privacy risks throughout the development lifecycle
Reviving the zombie subscriber population: Nordic innovators take charge
The rise of zombie subscribers, active accounts that people unknowingly pay for, has been fueled by consumers’ eagerness to consume content across various platforms. Nordic
Ensuring the Safe and Secure Use of Public Cloud Services
The public cloud, a model of cloud computing that allows remote access to resources like applications and data storage, comes with its own set of