Cloud

Think Someone Is Tracking Your iPhone? Here Are 4 Warning Signs To Look Out For

José Adorno/BGR If your iPhone has suddenly slowed down, its battery life has degraded considerably, or you’re seeing apps that you never downloaded, these might be signs that someone is tracking your iPhone. While Apple’s iOS system is fairly secure, it’s not uncommon for hackers to exploit vulnerabilities such as clicking a malicious link, downloading a…

Think Someone Is Tracking Your iPhone? Here Are 4 Warning Signs To Look Out For Read More »

SLA promises, security realities: Navigating the shared responsibility gap

The shared responsibility model (SRM) plays a central role in defining how security and operational duties are split between cloud providers and their customers. However, when this model intersects with service level agreements (SLAs), it introduces layers of complexity. SLAs typically cover metrics like uptime, support response times and service performance, but often overlook critical…

SLA promises, security realities: Navigating the shared responsibility gap Read More »

Apple Keeps Teasing homeOS, But One Crucial Piece Of The Puzzle Is Still Missing

José Adorno for BGR It’s only a matter of time until Apple finally announces homeOS, its software platform for home products. Teased more than once over the past few years, it seems the company always hits a snag right before revealing homeOS. This time, Israeli website The Verifier discovered references to “Apple Home” in the Settings app…

Apple Keeps Teasing homeOS, But One Crucial Piece Of The Puzzle Is Still Missing Read More »

Podcast: How (agentic) AI can help with unstructured data

In this podcast, we talk to Boris Bialek, vice-president and field chief technology officer (CTO) at MongoDB, about how artificial intelligence (AI) can help with discovery and management of unstructured data. Bialek sets out how AI can help bring together different classes of information that an organisation might hold about customers to make processes much…

Podcast: How (agentic) AI can help with unstructured data Read More »

Is history repeating itself with the government’s push to open public sector cloud deals to SMEs?

The UK government is on a mission to loosen the grip that legacy IT suppliers have on public sector IT budgets, amid concerns about how police forces, NHS trusts and local councils are wedded to suppliers whose offerings are not good value for money. Technology secretary Peter Kyle outlined the government’s ambitions on this front…

Is history repeating itself with the government’s push to open public sector cloud deals to SMEs? Read More »

CISPE criticised over securing preferential cloud pricing on Microsoft products for members

A European trade body is facing criticism for striking a deal with Microsoft that allows its members to host and resell the software giant’s cloud offerings with preferential pricing terms.   The Cloud Infrastructure Services Providers In Europe (CISPE) trade body has reached an agreement with Microsoft that will see its members offered revised pricing…

CISPE criticised over securing preferential cloud pricing on Microsoft products for members Read More »

Sapphire 2025: BASF evolves business with move to SAP S/4Hana

Chemical industry giant BASF is moving its SAP IT estate to the supplier’s S/4Hana enterprise resource planning (ERP) system as part of a business modernisation strategy, it was announced at the SAP Sapphire user and partner conference in Madrid. Petra Scheithe, senior vice-president of digitalization of services and ERP platforms at BASF Business Services, outlined…

Sapphire 2025: BASF evolves business with move to SAP S/4Hana Read More »

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration for IT security teams and professionals. As such, AWS offers a broad range of cyber security tools to secure AWS-based tech stacks. They cover areas such as data privacy, access management, configuration management, threat detection,…

How cyber security professionals are leveraging AWS tools Read More »

Apple devices are at ‘most risk’ in UK following government ‘backdoor’ order

Users of Apple devices in the UK are “at the most risk in the world” of being hacked, following a secret government order requiring the tech company to allow ‘backdoor’ access to its users’ encrypted data, the House of Lords heard on Monday 31 March.Liberal peer Paul Strasburger pressed the government to answer questions about…

Apple devices are at ‘most risk’ in UK following government ‘backdoor’ order Read More »

Apple’s appeal to the Investigatory Powers Tribunal over the UK’s encryption ‘backdoor’ explained

In mid-March 2025, Apple began a legal challenge to an order from the Home Secretary before the Investigatory Powers Tribunal (IPT) in London. According to information leaked to the Washington Post in February, a Technical Capability Notice (TCN) was issued to Apple by home secretary Yvette Cooper sometime in late 2024. It allegedly requires the…

Apple’s appeal to the Investigatory Powers Tribunal over the UK’s encryption ‘backdoor’ explained Read More »

Shopping Cart
Scroll to Top