line shadow
×

SOCIAL


LATEST BLOGS


Supply Chain Security: Data Erasure’s Role When Purchasing IT Assets


The Most Effective Techniques to Protect Yourself Online


LATEST TWEETS

DISCUSS & HIGHLIGHT
CHALLENGES & OPPORTUNITIES

...of the market places in which we operate.

line shadow
ECCV
DevOps today: What does it mean to you?

Over a third of EMEA enterprises are interconnected

More news on the ECCV conference
PSEICT
Digital transformation is a journey not a destination, and you need to travel with the right people

Four Concerns that Local Councils Need to Address in 2020

More news on the PSEICT conference
BDA
Big Data vs The Environment Challenge

Big Data Analytics for Healthcare

More news on the BDA conference
IDM
Lessons Learned from Remote Work during Covid-19

95% of North American CIOs report remote work issues during the pandemic lockdown, according to Hitachi ID and Pulse survey

More news on the IDM conference
CGBT
CGBT Conference 2018: Re-engineering government processes through private sector collaboration

Securing The Future

More news on the CGBT conference
ESRM
Supply Chain Security: Data Erasure’s Role When Purchasing IT Assets

Rogue Javascript Integrations Risk Attacks

More news on the ESRM conference
GOVSEC
Youtube, TikTok and Instagram Exposed in 223 Million Account Data Breach

UK Charity Breaches via Ransomware

More news on the GOVSEC conference
ECS
The Most Effective Techniques to Protect Yourself Online

Huge Firm’s Failure to Learn

More news on the ECS conference