Search Refinements
Current RefinementsContent TypeBlogsBlogCBR Rolling BlogRemove all refinements DateAuthorLocation

CBR Rolling Blog

1-15 of 1548 results

Demystifying Big Data - without diminishing the magic

Julien Sauvage, director of big data product marketing at Talend, on how to overcome the skills barrier hindering Big Data uptake.

Business Intelligence

Published 28 November 2014

Is the age of hyperconnectivity closer than we think?

Mike Hollands, director of connectivity at Interxion, looks at how a new age of hyperconnectivity will force a re-think of IT infrastructures.

Networking

Published 28 November 2014

Five things every MSP needs to know about cybersecurity

LogicNow's Ian Trump details the top 5 things MSPs need to know when assessing a customers cybersecurity.

Security

Published 25 November 2014

Time for firms to wise up to downstream data fraud

There is more to protect than the traditional data breach, argues ThreatMetrix's Alisdair Faulkner.

Security

Published 24 November 2014

Access rules don’t apply to administrators – do they?

Cryptzone's Jamie Bodley-Scott looks at the power, privilege and potential threat of system administrators and gives his top 5 tips on reducing the...

Security

Published 21 November 2014

Is technology set for a brain drain of talent?

Michael Bennett, Rethink Group Managing Director, looks at how traditional tech firms may have to start competing for the best tech talent.

Published 21 November 2014

Beyond Virtualisation

VDI simply does not measure up, argues ASG Software Solution's Torsten Volk.

Business Intelligence

Published 20 November 2014

Technological trading innovations – banks take notice

Toby Young, Chief Technology Officer at Ebury, looks at the range of different innovations coming from fintech startups, and how they’re shaking up...

The Boardroom

Published 19 November 2014

Read this month’s Computer Business Review – Security Matters

Security is like environmental management - you can ignore it for a long time and hope your inaction carries no consequences. Or you can grasp the...

Security

Published 17 November 2014

Deploy strong authentication using a multi-layered security strategy

Tim Phipps, VP of Product Marketing, Identity Assurance, HID Global, argues that relying on static passwords is no longer enough for enterprises.

Security

Published 13 November 2014

EU data sovereignty issues will not be solved by bricks and mortar

Simon Aspinall, president of Virtustream, on the decision to move away from building data centres.

Data Centre

Published 12 November 2014

Retailers: beware the omnichannel abyss

Davy Nys, VP EMEA & APAC at Pentaho, urges retailers to not let omnichannel fall into the abyss between IT and the business.

Content Management

Published 12 November 2014

Skeletons in Your IT Closet?

Vidya Vasu, Head of the ManageEngine Community and Free Tools, discusses how to manage your IT assets and taking control of your IT estate.

IT Services

Published 11 November 2014

Regulating the IoT– where are we now?

Vinod Bange, Partner at Taylor Wessing, discusses regulating the IoT.

Networking

Published 11 November 2014

How to mitigate against malvertising

Terry Greer-King, director of cybersecurity at Cisco, tells CBR how to beat malicious adverts.

Security

Published 07 November 2014

1-15 of 1548 results

Join our network

756 people like this.
0 people follow this.

Intelligence

Suppliers Directory


See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.