Internet of Things (IoT)

How to Tackle Ransomware by Managing Human Risk
CybSafe's analysis of ICO data finds the number of incidents of ransomware reported has doubled in a...

The CISO’s Guide to Effective Zero-trust Access
Best practices in network access stipulate a zero-trust access (ZTA) approach. CISOs looking to implement...

Zero Trust: The perfect solution for the perfect security storm
We're experiencing a classic example of the perfect storm. Never have organizations faced so many challenges...

Connected cities and places
Improving digital infrastructure is key to enabling a smarter city or place to develop, thereby creating...

Securing high tech industry network data
We all understand the negative impact of data loss, so why is it that so many organisations seem to be...

Bloor Research Data Governance Market Update
Streaming analytics is a space that is largely built on the back of stream processing. In turn, stream...

Unified Fast File and Object (UFFO) Storage
In this book, you get an idea of the vast potential for unstructured data — and also the infrastructure...

5G in the Transport sector
The Transport sector is pioneering the adoption of 5G connectivity, and yet it's doing so with quiet...

Five Keys to Optimize Your Data Lake with Data Governance
This is a story about two data lakes. On the surface, they seem identical. Both hold the same volume...

3 technologies you need to future-proof your organization
New technology can be a scary thing. New processes to learn, new systems to teach your team and new ways...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.