Deloitte takes control of digital identities with blockchain technology
News: Applications will help manage digital identity in the blockchain era.
Published On11:29, May 4 2016
ASA cracks down on ISPs with all-inclusive broadband prices
News: Line rental can no longer be separated out in broadband advertising.
Published On10:48, May 4 2016
5 mobile threats to your business including malware and OS vulnerabilities and how to deal with them
List: What threats are out there and what can you do to protect against them?
Published On09:54, May 4 2016
Pivotal, VMware, Brocade & OpenStack all in the spotlight at EMC World
List: All-flash innovations and a hybrid cloud focus opens up EMC to more companies.
Published On09:22, May 4 2016
EMC World: Hybrid cloud strategy takes shape as VMware opens EMC to AWS, Google & Microsoft Azure
News: EMC focuses on product pitches as VMware makes an appearance during the second day keynote.
Published On08:34, May 4 2016
Avoiding Internet of Things security breaches – read these five reports to learn about IOT security protection
List: AT&T, Telefonica, Symantec, Bitdefender and Spiceworks show their findings in the most recent IoT security reports of 2016.
Published On16:48, May 3 2016
Cheaper mobile roaming to come into effect in EU
The measure is being introduced ahead of full ban on roaming charges from 15 June 2017.
Published On12:57, May 3 2016
5 of the biggest Internet of Things smart city projects from around the world
List: Spain, UAE, Singapore and Australia, across the world governments and companies are investing heavily in smart city research and projects.
Published On12:07, May 3 2016
US court slaps $7m fine on Gozi malware creator
News: The virus Gozi appeared in 2007 and helped in siphoning millions of dollars.
Published On12:03, May 3 2016
Mobile network operators could miss out on $142 billion mCommerce revenue
News: Old billing systems and other tech barriers could see operators lose out on mCommerce market share.
Published On11:28, May 3 2016
Trending on CBR
- How to protect data centre critical national infrastructure from cyber attack
- How vulnerable is critical infrastructure to cyber attacks
- The critical first hours of a data breach: What to do when your business has been hacked
- TalkTalk head of security: What we learned from the cyber attack
- 5 cloud cyber security tools that will protect your business
- Pivotal now a $2.8 billion company as Microsoft and Ford lead $253 million investment round
In the spotlight
Red Hat JBoss Fuse Compared with Oracle Service Bus
The ability to integrate systems and share data across the enterprise is a common datacenter need. “Integration bus” is a common term that...
Justifying IT Security - Managing Risk and Keeping Your Network Secure
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely...
10 reasons to deploy WAN optimization in an economic downturn
It’s no secret that companies often look to cut IT budgets in times of economic difficulty. But as McKinsey Consulting recently reported, it...
Addressing The International Market
When communicating with customers or prospects your address database should be the core of your business strategy. If your database is filled with...
- Trillium Software - Enterprise Data Quality
- Sophos overview
- AtTask - Project Management Software for the Enterprise
Procorre - Professional IT and Computer Consultancy
Procorre consultancy provides IT and technology strategy solutions to maximise performance of clients' IT assets and investments.