In-depth

What is phishing?
phishing

What is phishing?

From banking scams to industrial espionage, we look at why phishing is so lucrative
13 Oct 2020
What are biometrics?
Security

What are biometrics?

Your face, iris, DNA ad typing style can all be used as a password
13 Oct 2020
16 top BBC micro:bit projects
Hardware

16 top BBC micro:bit projects

Learn everything from beginner projects to challenges for confident coders
13 Oct 2020
Buyer's guide to video conference room solutions
video conferencing

Buyer's guide to video conference room solutions

A great video conferencing setup can make a genuine difference to how teams communicate. This is what to look for
13 Oct 2020
What is WannaCry?
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
12 Oct 2020
Active vs passive reconnaissance
penetration testing

Active vs passive reconnaissance

Exploring essential tools of both ethical and malicious hackers alike
12 Oct 2020
Staffordshire University: Automating in the age of coronavirus
automation

Staffordshire University: Automating in the age of coronavirus

The institution has partnered with Blue Prism to kickstart its 2030 digital strategy – starting with a complex automation project
12 Oct 2020
Should we stop selling the crown jewels of tech?
mergers and acquisitions

Should we stop selling the crown jewels of tech?

After a string of high-profile sales, the tech world is starting to ask if it's time to protect the UK’s technology assets
10 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

An overly complicated architecture could be your biggest weakness
9 Oct 2020
What is CRM documentation?
customer relationship management (CRM)

What is CRM documentation?

CRM software can be transformative, but employees need the resources to get the best out of it
9 Oct 2020
Why you should prioritise privileged access management
Sponsored

Why you should prioritise privileged access management

Our changing work practices make PAM more vital to cyber security than ever
9 Oct 2020
Your roadmap to becoming a computer network architect
Careers & training

Your roadmap to becoming a computer network architect

Explore what a computer network architect does and how to become one
9 Oct 2020
The IT Pro Podcast: Picking a programming language
programming languages

The IT Pro Podcast: Picking a programming language

With so many options, which languages should aspiring coders focus on?
9 Oct 2020
What is cloud security?
Blue square background with a yellow cloud superimposed, with a cut-out key icon on it to represent cloud security
Security

What is cloud security?

Storing data in the cloud has many benefits, but failure to secure it can lead to very real consequences
8 Oct 2020
How Liberty navigated a site relaunch during a pandemic
Liberty London's Tudor-revival building illuminated at night
Sponsored

How Liberty navigated a site relaunch during a pandemic

We speak to e-commerce director Eric Fergusson about the challenges and opportunities for growing online retail in 2020
8 Oct 2020
What is Kubernetes?
enterprise applications

What is Kubernetes?

We take a look at the open source platform powering containerisation at scale
8 Oct 2020
Which tech should your business invest in now?
Business strategy

Which tech should your business invest in now?

Why now is the time to put the tech foundations in place for your post-coronavirus future
8 Oct 2020
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

If your computer systems are attacked, is the law effective enough to put those criminals behind bars?
8 Oct 2020
How to build your own firewall with pfSense
firewalls

How to build your own firewall with pfSense

Create your own physical or virtual appliance with this free-to-use open source software
7 Oct 2020
Q&A: CEO Stefan Walther on the benefits of ‘Hosted by 3CX’
Advertisement Feature

Q&A: CEO Stefan Walther on the benefits of ‘Hosted by 3CX’

3CX Phone System v16 continues to evolve and improve with its newest update
6 Oct 2020
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

Cyber security is in demand from every organisation, but what training and certification is needed?
6 Oct 2020
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Each of these popular cloud platforms boasts robust security - but which does it best?
6 Oct 2020
Google is right, we don’t need £1,000 phones
The Google Pixel 5 in white
Mobile Phones

Google is right, we don’t need £1,000 phones

The smartphone industry shrunk its own market with unaffordable prices
6 Oct 2020
How to wipe a laptop easily and securely
Security

How to wipe a laptop easily and securely

Selling your laptop? Make sure that all your sensitive data is gone before it reaches its new owner
5 Oct 2020