browse
5 Questions Executives Should be Asking Their Security Teams - 6/19/2018
Platform : Office
CPU Vulnerabilities Force Chip Makers to Focus on Hardware Security - 6/7/2018
Platform : Security
The state of IT security, 2018 - 5/29/2018
Platform : Security
Why You Need the Cybersecurity Framework - 5/20/2018
Platform : Digital Security
Security by Design - A Security Snapshot - 5/22/2018
Platform : Security
The Importance of Cybersecurity and the GDPR - 5/14/2018
Platform : GDPR
Leaders Preparing for 2018 Global Automotive Cybersecurity Summit in Detroit - 5/14/2018
Platform : Cybersecurity
Learn Fast - The New Mantra for Enterprise Growth Hacking - 5/14/2018
Platform : IT Management
 

Last week's most popular technology story...

Review your IT supplier contracts to reflect changing technology & GDPR

GDPR is driving a major review of how we handle personal data and sparking much discussion. One of the spinoffs of the GDPR has been to bring IT vendor contracts clearly into focus. Since for a business to become GDPR compliant, it has to ensure that its partners and its wider ecosystem - its technology partners and the cloud-based providers who process its data - are included, these responsibilities need to be clarified and written into commercial contract terms. It is the very last but crucial step in achieving compliance - to write...

Read Article

browse
Crash course in Office 365
by: Microsoft
Information Technology | Software | Business | Office
The Rise of Contractors and the Impact for Employers
by: Avalara
Human Resources | Operations | Personnel | Inbound | Hiring
5 Must-Have Features for Business VoIP
by: Ziff Davis
Information Technology | Hardware | Telecom | VOIP
Unified Communications: The Layman's Guide
by: Ziff Davis
Information Technology | Hardware | Telecom | VOIP
4 Simple Steps to VoIP Vendor Selection
by: Ziff Davis
Information Technology | Hardware | Telecom | VOIP
5 Signs You Need a VoIP Phone System
by: Ziff Davis
Information Technology | Hardware | Telecom | VOIP
 
Top 10s
Review your IT supplier contracts to reflect changing technology & GDPR- HowTo | UK - SC Magazine
Securely deploy cloud and mobile technologies with New network guidance- HowTo | UK - It Reseller
Ontario Institute for Cancer Research uses open source clouds to aid cancer research- CaseStudy | Computer Weekly
How technology is changing transport in London today- Research | Tech World
Cryptojacking: How to avoid being a victim- HowTo | UK - SC Magazine
Securely deploy cloud and mobile technologies with New network guidance- HowTo | UK - It Reseller
Ontario Institute for Cancer Research uses open source clouds to aid cancer research- CaseStudy | Computer Weekly
How technology is changing transport in London today- Research | Tech World
Cryptojacking: How to avoid being a victim- HowTo | UK - SC Magazine
Securely deploy cloud and mobile technologies with New network guidance- HowTo | UK - It Reseller

browse
Why There's A Need to Embrace The Disruptor Called Gamification - HowTo | Game Development
Women In Tech: Taking On The Gender Divide On Their Terms - HowTo | IT Job Market
6 Common Twitter Mistakes (and How to Avoid Them!) - HowTo | Social Networking
Get to Inbox Zero with These 3 Tips - HowTo | Email
5 Biggest Challenges of Business Intelligence Software (and How to Solve Them) - HowTo | Business Intelligence
Cybersecurity: How Do You Build a Transformational Dynamic? - HowTo | Cybersecurity
Agile project management: 16 tips for a smooth switch to agile - HowTo | Agile
How to Be Certain Your IT Salary Is Competitive - HowTo | IT Job Market