top of page

Featured News

Apricorn study finds firms ramping up on encryption

Encryption adoption soars to 94%, but inconsistent application continues to put sensitive data at risk.

Fingerprint Access

IT for CEOs & CFOs brings the most authoritative information to CEOs, CFO, and CIOs involved in IT and Software.

 

Articles are written by experts whose authority comes from careful analysis, study, and experience, and are relevant to different industries, sectors and geographical locations.

 

Covering all areas of IT and Software, IT Security, Compliance, Data Centres, Cloud Computing, Cabling, Hardware, Green IT, Electronics, Mobile, AI and New Technologies, the ideas presented in these articles have been tested in the real world of business and can be translated into action.

 Recent Sample Papers

Mission Impossible of storage

In today’s data-driven world, those overseeing enterprise storage and the security of data infrastructure face unprecedented challenges – and unprecedented opportunities.

Data Cloud
In conversation with Dr Megha Kumar
We talk to Dr Megha Kumar, Chief Product Officer and Head of Geopolitical Risk at CyXcel about recent research findings.
Photo - CyXcel - In Conversation with Dr Megha Kumar.jpg
How to implement recovery-first ransomware detection

The increasing scale, sophistication, and frequency of ransomware attacks necessitate that organizations acknowledge the vulnerability of all systems and datasets.

Video Game
In conversation with Dr Francesca Boem

As connected technologies take on more critical functions – from managing power grids and hospitals to transport networks and industrial sites – the boundary between cyber and physical risk is disappearing.

Photo - IEEE - In Conversation with Dr Francesca Boem 2.jpg
​Fintech runs on data
Fintechs’ sights are firmly set on the future and with that they are setting out clear technology priorities to adapt to the changing landscape.
Financial Data
Forensic analysis and reporting a cyberattack
How deep content analytics enables unrivalled forensic analysis and reporting of cyberattacks.
Financial Graphs
Continuity
Reduce downtime risk - adopt ransomware detection

The rate of cyberattacks is increasing each week.

Data Analyst
The strategic role of Channel Partners

A significant transformation is underway in many manufacturing enterprises

Data Processing
Are you RAG ready?

Retrieval-Augmented Generation (RAG) is a technique that enhances Large Language Models (LLMs).

Photo - INFINIDAT - RAG.jpg
bottom of page