top of page

Featured News

Cyber storage is last line in defence​​

​Research by The Register reveals enterprises now place cyber storage resilience as their “last line in defence” with 56.2% of enterprises citing that they have already incorporated storage solutions into their overall cybersecurity strategy

Padlock

IT for CEOs & CFOs brings the most authoritative information to CEOs, CFO, and CIOs involved in IT and Software.

 

Articles are written by experts whose authority comes from careful analysis, study, and experience, and are relevant to different industries, sectors and geographical locations.

 

Covering all areas of IT and Software, IT Security, Compliance, Data Centres, Cloud Computing, Cabling, Hardware, Green IT, Electronics, Mobile, AI and New Technologies, the ideas presented in these articles have been tested in the real world of business and can be translated into action.

 Recent Sample Papers

In conversation with Dr Megha Kumar
We talk to Dr Megha Kumar, Chief Product Officer and Head of Geopolitical Risk at CyXcel about recent research findings.
Photo - CyXcel - In Conversation with Dr Megha Kumar.jpg
How to implement recovery-first ransomware detection

The increasing scale, sophistication, and frequency of ransomware attacks necessitate that organizations acknowledge the vulnerability of all systems and datasets.

Video Game
In conversation with Dr Francesca Boem

As connected technologies take on more critical functions – from managing power grids and hospitals to transport networks and industrial sites – the boundary between cyber and physical risk is disappearing.

Photo - IEEE - In Conversation with Dr Francesca Boem 2.jpg
​Fintech runs on data
Fintechs’ sights are firmly set on the future and with that they are setting out clear technology priorities to adapt to the changing landscape.
Financial Data
Forensic analysis and reporting a cyberattack
How deep content analytics enables unrivalled forensic analysis and reporting of cyberattacks.
Financial Graphs
Continuity
Reduce downtime risk - adopt ransomware detection

The rate of cyberattacks is increasing each week.

Data Analyst
The strategic role of Channel Partners

A significant transformation is underway in many manufacturing enterprises

Data Processing
Are you RAG ready?

Retrieval-Augmented Generation (RAG) is a technique that enhances Large Language Models (LLMs).

Photo - INFINIDAT - RAG.jpg
World Back Up Day 2025

Traditional backup environments are high-value targets for cyber attacks.

Data Cloud
bottom of page