Search Refinements
Current RefinementsContent TypeBlogsBlogCBR Rolling BlogRemove all refinements DateAuthorLocation

CBR Rolling Blog

16-30 of 1554 results

Deploy strong authentication using a multi-layered security strategy

Tim Phipps, VP of Product Marketing, Identity Assurance, HID Global, argues that relying on static passwords is no longer enough for enterprises.

Security

Published 13 November 2014

EU data sovereignty issues will not be solved by bricks and mortar

Simon Aspinall, president of Virtustream, on the decision to move away from building data centres.

Data Centre

Published 12 November 2014

Retailers: beware the omnichannel abyss

Davy Nys, VP EMEA & APAC at Pentaho, urges retailers to not let omnichannel fall into the abyss between IT and the business.

Content Management

Published 12 November 2014

Skeletons in Your IT Closet?

Vidya Vasu, Head of the ManageEngine Community and Free Tools, discusses how to manage your IT assets and taking control of your IT estate.

IT Services

Published 11 November 2014

Regulating the IoT– where are we now?

Vinod Bange, Partner at Taylor Wessing, discusses regulating the IoT.

Networking

Published 11 November 2014

How to mitigate against malvertising

Terry Greer-King, director of cybersecurity at Cisco, tells CBR how to beat malicious adverts.

Security

Published 07 November 2014

Being responsive to mobile commerce is not enough…

MoPowered's Jim Rudall discusses how retailers must create the best possible mobile experience - or face losing business.

Mobile & tablets

Published 07 November 2014

Hybrid cloud: reducing risks by getting the best of both worlds

By Doug Clark, Cloud Leader for IBM UK & Ireland

Cloud SaaS

Published 05 November 2014

What are the parallels between regulatory overload and the role of the data scientist?

As compliance deadlines continue to stack up, Dev Bhudia of GoldenSource explains why the data scientist is playing an increasingly vital role in...

Business Intelligence

Published 04 November 2014

The benefits of UC for blue light services

Intrinsic tells us why emergency services are using unified communications.

Mobile & tablets

Published 29 October 2014

Why startups should consider alternative funding

IT entrepreneur? There's other funding options than just the bank...

Start-ups

Published 27 October 2014

SAP is the Latest AP Vendor to Highlight New App Development Tools Approach

Guest blog by Charlotte Dunlap, senior analyst for application platforms at Current Analysis.

App Dev and SOA

Published 24 October 2014

How hacking as a disservice targets your apps

Guest blog by Pedro Bustamante, director of special projects at Malwarebytes.

Security

Published 24 October 2014

What happens to your data once it’s been stolen?

Patrick Petersen, CEO at Agari, looks in to the black market for data.

Published 24 October 2014

How to manage application change risk

Veeam explains how to test apps without suffering downtime.

App Dev and SOA

Published 16 October 2014

16-30 of 1554 results

Join our network

761 people like this.
2017 people follow this.

Intelligence

Suppliers Directory


See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.