Azure

Navigating the practicalities of AI regulation and legislation

Misusing artificial intelligence (AI) can have some very clear and expensive consequences. Movie studio Lionsgate recently joined a long list of organisations discovering that quotations and citations from generative AI (GenAI) systems need to be verified like any other source; Microsoft is being sued by a German journalist after Bing Copilot suggested he had committed crimes…

Navigating the practicalities of AI regulation and legislation Read More »

Google Cloud Platform: Key storage options in the Google Cloud

Google’s first step into the cloud was App Engine, launched in 2008. Google Cloud Storage followed later in 2010. Since then, the company has steadily expanded to what is now known as the Google Cloud Platform (GCP) and consolidated its position as one of the three, global “hyperscale” cloud storage providers. Google Cloud is seen…

Google Cloud Platform: Key storage options in the Google Cloud Read More »

Tech workers say diversity and inclusion efforts are working

Tech workers claim that where organisations are working to improve diversity, equity and inclusion (DEI) those efforts are making a difference, according to a survey. As part of its Careers and Hiring Guide 23/24, tech talent firm Tenth Revolution Group gathered data from global employees at Amazon Web Services, Microsoft 365, Azure and Business Applications,…

Tech workers say diversity and inclusion efforts are working Read More »

Are you on the naughty or nice list for responsible AI adoption?

Over the past year, artificial intelligence (AI) has proved its worth as a long-term investment for businesses. It brings a range of perfectly wrapped presents to the table, making a significant impact on productivity, efficiency, and automation across business functions. With almost 40% of companies worldwide already using AI in some form, it’s undeniable that…

Are you on the naughty or nice list for responsible AI adoption? Read More »

Blue Yonder ransomware attack breaks systems at UK retailers

A ransomware attack on the systems of Blue Yonder, a specialist supply chain management software provider based in the US, continues to cause knock-on impacts to the systems of multiple UK-based retailers, including major supermarkets. The attack unfolded prior to the weekend of 23 and 24 November, and impacted the organisation’s managed services hosted environment.…

Blue Yonder ransomware attack breaks systems at UK retailers Read More »

In the cloud, effective IAM should align to zero-trust principles

In today’s digital landscape, the traditional security perimeter has dissolved, making identity the new frontline of defence. As organisations increasingly adopt cloud services and remote work models, managing and securing identities has become paramount. Effective Identity and Access Management (IAM) practices are essential for IT departments to safeguard against cyber-attacks, phishing attempts, and ransomware threats.…

In the cloud, effective IAM should align to zero-trust principles Read More »

Cloud data lakes: Where do they fit and what are their benefits?

Many enterprises are moving towards use of data lakes to help in managing increasing amounts of information. Such large repositories allow organisations to gather and store structured and unstructured data before handing it off for further data management and processing in a data warehouse, database, enterprise application, or to data scientists and analytics and artificial intelligence…

Cloud data lakes: Where do they fit and what are their benefits? Read More »

Nokia lands five-year extension on Microsoft Azure datacentre networking deal

Nokia has secured a five-year extension of its long-standing agreement to supply routers and switches to Microsoft Azure datacentres worldwide. The contract will see the Finnish networking company roll out its open source SONiC-based datacentre switches to new and existing Microsoft Azure datacentres. This is in support of the public cloud giant’s push to upgrade…

Nokia lands five-year extension on Microsoft Azure datacentre networking deal Read More »

BianLian cyber gang drops encryption-based ransomware

The Australian Cyber Security Centre (ACSC) and the United States’ Cyber Security and Infrastructure Security Agency (CISA), have published updated intelligence on the activities of the dangerous BianLian ransomware operation, after observing a rapid evolution in the gang’s tactics, techniques and procedures (TTPs). One of a number of gangs that first came to prominence alongside…

BianLian cyber gang drops encryption-based ransomware Read More »

IAM within the framework of defence in depth

IT leaders should address their internal processes to minimise their organisations’ IT security risk exposure and attack surface. This becomes ever more complex as business IT environments evolve. Leaders not only need to consider which employees and job roles require access to which IT systems, but also non-human access controls where either an internal or…

IAM within the framework of defence in depth Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top