risk management

What VMware’s licensing crackdown reveals about control and risk 

Over the past few weeks, VMware customers holding onto their perpetual licenses, which are often unsupported and in limbo, have reportedly begun receiving formal cease-and-desist letters from Broadcom. The message is as blunt as it is unsettling: your support contract has expired, and you are to immediately uninstall any updates, patches, or enhancements released since…

What VMware’s licensing crackdown reveals about control and risk  Read More »

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration for IT security teams and professionals. As such, AWS offers a broad range of cyber security tools to secure AWS-based tech stacks. They cover areas such as data privacy, access management, configuration management, threat detection,…

How cyber security professionals are leveraging AWS tools Read More »

Secure software procurement in 2025: A call for accountability

The software security landscape is at an interesting juncture. As Jen Easterly, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), pointed out, there is a lesson to be drawn from the automotive industry of the 1960s. Its approach to improving car safety by building better designs – including seatbelts, crumple zones, and…

Secure software procurement in 2025: A call for accountability Read More »

Navigating the practicalities of AI regulation and legislation

Misusing artificial intelligence (AI) can have some very clear and expensive consequences. Movie studio Lionsgate recently joined a long list of organisations discovering that quotations and citations from generative AI (GenAI) systems need to be verified like any other source; Microsoft is being sued by a German journalist after Bing Copilot suggested he had committed crimes…

Navigating the practicalities of AI regulation and legislation Read More »

EMEA businesses siphoning budgets to hit NIS2 goals

With the European Union’s (EU) NIS2 regulations now in full effect, IT leaders across the region report that they are struggling to secure budget to support their compliance efforts, with 95% reporting they are being forced to dip into funds reserved for other things. This is according to a Censuswide study of EMEA IT leaders…

EMEA businesses siphoning budgets to hit NIS2 goals Read More »

Data classification: What, why and who provides it

When it comes to managing data, we need to know where it is – but we also need to know what it is. With the rise in regulatory controls, enterprises now pay more attention to data sovereignty, especially when it comes to data in the cloud, but to know exactly what information they hold is…

Data classification: What, why and who provides it Read More »

How UK firms can get ready for the implementation of NIS2

The European Union’s landmark cyber security bill NIS2 is just months away from coming into force. With a compliance deadline of 17 October, the law aims to improve the bloc’s ability to fight rising levels of cyber crime by ensuring all member states follow the same cyber security rules and procedures.  Under this directive, each EU member…

How UK firms can get ready for the implementation of NIS2 Read More »

Forrester: Rethink your software asset management practices

Software asset management (SAM) has evolved from simple back-office record-keeping to more complex licence and contract management that integrates innovative technologies such as artificial intelligence (AI), machine learning (ML) and generative AI (GenAI). Successful SAM implementations save on licence costs, improve compliance and reduce true-ups. They also improve software utilisation, enabling firms to derive more…

Forrester: Rethink your software asset management practices Read More »

Cloud security challenges not just technological

In the evolving IT landscape, cloud deployments have become deeply entrenched in business operations, presenting both unprecedented opportunities and significant challenges. The widespread adoption of cloud technologies has created a complex and dynamic environment, often spanning multiple providers and geographical regions, each with its own laws, regulations, and standards. From fragmented environments to access control…

Cloud security challenges not just technological Read More »

Mimecast to buy insider threat specialist Code42

Human-centred risk management experts Mimecast and Code42 are to come together as a single business in an acquisition that builds on a previously established tech partnership, with Mimecast set to add Code42’s product suite into its platform to enhance its insider threat detection and response capabilities. Mimecast, which bills itself as a provider of “AI-powered,…

Mimecast to buy insider threat specialist Code42 Read More »

Shopping Cart
Scroll to Top