o, we’ve gone through the halfway point at this year’s Ignite conference in Orlando and aside from the wealth of technical sessions on offer to attendees there’s a heap of other stuff to see and do.
Following on from yesterday’s announcements at Ignite around the transformation to the modern workplace I have spent some time today looking at the new vision for intelligent communications.
ISN continues its commitment to professional development and maintains their ability to offer industry leading best of breed solutions by networking with industry leaders in the Microsoft world at MS Ignite.
Cyber Security: The Current State of Play Cyber criminals are becoming ever more sophisticated and resourceful – and are increasingly inclined to lock systems and destroy data as part of their attack process.
2017 is the year of ransomware, says a recent report by the Institute for Critical Infrastructure Technology, an industry think tank. When it comes to battling ransomware, your best offence is a good defence.
‘Shadow IT’ is a term often used to describe information technology systems and solutions built and used inside organisations without explicit organisational approval. It is also used, along with the term ‘Stealth IT’, to describe solutions owned, specified and deployed by departments other than the IT department.
Adaptive authentication is an extensive fraud detection system in which risk-based multi-factor authentication is used to ensure the protection of users accessing websites, portals, browsers or applications.
When it comes to securing the enterprise, the rise of cloud, BYOD and mobile working have changed the rules of the game. Today’s IT teams have to cope with ever more complex networks – opening up vulnerabilities to a rapidly expanding array of threats. And the proliferation of devices that are connecting to corporate networks […]
The biggest multi-agency training exercise in London Fire’s history – Exercise Unified Response is a large scale and complex, disaster training exercise…
In the digital age, it’s important to know that a password is only as strong as the weakest place it is used…