1 |
Beyond the perimeter: why remote working doesn’t have to mean substandard cyber security |
2 |
Deskflix: devops |
3 |
Connected vision: why consolidating your connectivity needs will lead to a more flexible and secure business |
4 |
Computing devops excellence awards 2020 |
5 |
Escaping 'pa***word h****': biometrics of ıt and security (3) |
6 |
Deskflix season four: devops |
7 |
ınsurance ıt has moved on from 'building software': an interview with rsa's group cıo david germain |
8 |
Risk mitigation for remote working: making office 365 safer for business |
9 |
Uk ıt awards: get the top tips from the experts on crafting your entries |
10 |
Puppet's event-driven ops platform relay enters beta, aimed at reducing alert overload |
11 |
Amazon launches $2bn fund to support low-carbon innovation |
12 |
Microsoft acquires industrial ıot security startup cyberx |
13 |
J***an's fugaku takes top spot as world's most powerful supercomputer |
14 |
The business benefits of devops and dataops |
15 |
Apple announces ios 14, ipados 14, big sur, watchos 7 and other updates at wwdc 2020 |
16 |
Apple ditches ıntel to switch mac computers to its own arm-based processors |
17 |
Charity ıt leaders offering 20 free members***ps |
18 |
Has***corp moves into cloud-ops managed services |
19 |
Selling to the c-suite |
20 |
Brands are different now |
21 |
How tech organisations buy |
22 |
Case study: making a start-up culture work |
23 |
Case study: building scalable lead generation that doesn't cost a packet |
24 |
Reducing the cyber security risk of home working |
25 |
Uk to amend law to protect businesses from foreign takeovers amid concerns over chinese investment |
26 |
ındustry voice: how the cloud can provide stability in a changing world |
27 |
Ncsc advises telecom operators to maintain adequate stock of huawei equipment in face of us trade sanctions |
28 |
Huawei may be a risk but the west should compete with chinese firms rather than banning, says ex-google ceo eric schmidt |
29 |
Nsa pilots secure dns model to protect against malware attacks |
30 |
Australia says it is dealing with ma***ive cyber attacks from sophisticated state-based actor (2) |
31 |
Covid-19 contact tracing app: government u-turns to adopt decentralised apple - google apı model (2) |
32 |
Operation ın(ter)ception: hackers target aerospace companies via linkedın recruitment messages |
33 |
Tuesday 25 june |
34 |
Wednesday 1st july, 3pm |
35 |
Click here to find out more |
36 |
Entries close soon – friday 3 july |
37 |
How data is helping ngos deploy aid in lebanon's struggling refugee camps |
38 |
How to protect your business from coronavirus-related email phis***ng |
39 |
Why moving to the cloud requires a unified support strategy |
40 |
Microsoft adds uefı scanner in windows 10 to help detect firmware attacks |
41 |
A brief look at aı-enhanced security solutions |