browse
How secure is your IT infrastructure? 5 ways Office 365 improves security - 10/21/2018
Platform : Security
Six steps to develop comprehensive security strategy with Microsoft 365 - 8/2/2018
Platform : API
The Apple DEP flaw explained - and how to bolster security - 9/28/2018
Platform : Security
Apple iOS 12 Not Flashy but Boasts Improved Security, Performance - 9/21/2018
Platform : Mobile Devices
Pentagon CIOs struggle with legacy tech, security. Sound familiar? - 9/21/2018
Platform : CIO
Identities Are The New Security Perimeter - 9/15/2018
Platform : Digital Security
Cisco 2018 Annual Cybersecurity Report - 9/5/2018
Platform : Laws & Regulations
CIOs reveal their security philosophies - 7/31/2018
Platform : Security
 

Last week's most popular technology story...

WikiLeaks goes public with alleged list of AWS datacentre locations and code names

WikiLeaks has published details of the alleged location and code names of more than 100 Amazon Web Services (AWS) datacentres, as the cloud giant prepares to bid for a sizeable cloud deal with the US Department of Defense. The whistle-blowing website claims to have obtained a “highly confidential” internal AWS document, dating back to late 2015, detailing the addresses, phone numbers and some operational details of the facilities, which are dotted across 15 cities and nine countries. For instance, the 20-page document...

Read Article

browse
HR's Secret Weapon: The Power of Big Data
by: Ultimate Software
Human Resources
Ce que j'aurais aimé savoir: Cinq dirigeants de petites entreprises partagent les secrets de leur réussite
by: Microsoft
Information Technology | Security
4 façons de motiver la génération du millénaire au travail
by: Microsoft
Information Technology | Security
Get an Enterprise Phone System without High Cost and Complexity
by: Ziff Davis
Information Technology | Hardware | Telecom | VOIP
5 Ways to Keep Employees Engaged & Productive
by: Microsoft
Information Technology | Security
If I had known that: Five small business owners talk about the secret of their success
by: Microsoft
Information Technology | Software | Software Development | API
 
Top 10s
WikiLeaks goes public with alleged list of AWS datacentre locations and code names- News | Computer Weekly
Nato grappling with implications of cyberspace as domain of warfare- News | UK - SC Magazine
Are we witnessing the death of the nine to five work day?- News | UK - CRN Channelweb.co.uk
Making better use of your DevOps rock stars- News | UK - Computing
Symantec yields to activist investor- News | UK - CRN Channelweb.co.uk
Puppet ushers in new era of DevOps with product portfolio expansion- News | UK - It Reseller
Oxford VR treats mental health problems with virtual reality therapy- CaseStudy | Tech World
Vulnerabilities found in Intel Unified Shader compiler- SecurityAlert | UK - SC Magazine
Enterprise shift to cloud main driver in worldwide IT spending- Research | UK - CRN Channelweb.co.uk
Blockchain update: UK leads the way in blockchain deployments for supply chain- News | UK - Computing

browse
How to Protect Your Company From Getting Hacked - HowTo | Hacking
10 magical productivity tips for Mac - HowTo | Apple
How to Boost Your Workstation's Performance With RAID Data Storage - HowTo | Desktops
3 Ways to Boost Organizational Speed - HowTo | CIO
5 clever little iCloud tips you'll probably use | Computerworld - HowTo | Apple
Why There's A Need to Embrace The Disruptor Called Gamification - HowTo | Game Development
Women In Tech: Taking On The Gender Divide On Their Terms - HowTo | IT Job Market
6 Common Twitter Mistakes (and How to Avoid Them!) - HowTo | Social Networking