Zach Cooper
Latest articles by Zach Cooper
![null](https://cdn.mos.cms.futurecdn.net/dVKpvMzZYcLt8bQLKxdPB8-320-80.jpg)
How digital transformation is impacting application delivery
By Zach Cooper last updated
In-depth Bridging the gap between traditional and microservice application delivery will be a new challenge for evolving businesses
![A shield with a keyhole on a radar system denoting cyber security](https://cdn.mos.cms.futurecdn.net/jEcgjwrxDgkjXfaDBqsrBL-320-80.jpg)
Active vs passive reconnaissance
By Zach Cooper last updated
In-depth Exploring essential tools of both ethical and malicious hackers alike
![A file folder of 1s and 0s floats on a web of connected @ symbols](https://cdn.mos.cms.futurecdn.net/PmhkCh5V6PDDo3Whs74Anc-320-80.jpg)
Email archiving systems: The forgotten element of cyber security
By Zach Cooper last updated
In-depth With cyber criminals ready to pounce on overlooked systems, there's no time to lose
![null](https://cdn.mos.cms.futurecdn.net/a7CpVuyjCyHtpHtrY5BCXC-320-80.jpg)
Two-thirds of employees work with damaged phones
By Zach Cooper published
Analysis Left unresolved, cracks lead to disruption
![null](https://cdn.mos.cms.futurecdn.net/iTW98Kft24dmYV98XBnkDF-320-80.jpg)
Four business benefits of low-code
By Zach Cooper published
In-depth Low-code is the productivity tool capable of streamlining your development process
![Red horse image imposed atop a circuitboard](https://cdn.mos.cms.futurecdn.net/MmmXXcLzgWnhkLwWDA5LzF-320-80.jpg)
Four steps to exterminating RATs controlling your computer
By Zach Cooper published
In-depth Unless actively pursued, damaging remote access trojans have the ability to live years undetected
![Silhouettes of a team of office workers with a blue technology overlay to represent the future](https://cdn.mos.cms.futurecdn.net/d9mdtgnAJC5MFBLzVgNey6-320-80.jpg)
What does the future of work look like?
By Zach Cooper, Clare Hopping, Esther Kezia Thorpe last updated
In-depth How remote working, automation and AI will affect the way we work
![Infrastructure](https://cdn.mos.cms.futurecdn.net/82F3k4spENjRkPX8xc3WwM-320-80.jpg)
Our 5-minute guide to ITaaS
By Zach Cooper published
In-depth What is ITaaS, what are the pros and cons, and how best can it be implemented?
![email symbols over a man's hands](https://cdn.mos.cms.futurecdn.net/7jRh7ZTXc2QLcn5BqGTUTo-320-80.jpg)
Nine top GDPR tips for email marketing strategies
By Zach Cooper, Adam Shepherd last updated
In-depth It's not all doom and gloom – here's how you can make GDPR work for you
![Database graphic](https://cdn.mos.cms.futurecdn.net/fCvcAKbnVnaXSKLtYfk7oT-320-80.jpg)
Are autonomous databases the doom of database administrators?
By Zach Cooper published
In-depth For DBAs, the gradual pervasiveness of autonomous databases means it’s time for them to sink or swim
![null](https://cdn.mos.cms.futurecdn.net/qHZRxU3TfAjh3QVpTDu4tk-320-80.jpg)
Three ways a cloud-native CMS improves your content processes
By Zach Cooper published
In-depth A cloud-native CMS can be the differentiator between delivering an enhanced customer experience and falling behind competitors
![Digital marketing cloud](https://cdn.mos.cms.futurecdn.net/pqVYeomwEZ7sSKy74gfZEj-320-80.jpg)
How to build an effective marketing strategy with the cloud
By Zach Cooper last updated
In-depth A guide to using SaaS to build an effective MarTech stack
![null](https://cdn.mos.cms.futurecdn.net/5GwAnDXuH7mMMATnSbHmEJ-320-80.jpg)
Five cloud-based tools your business needs
By Zach Cooper published
In-depth Building a digital workspace can be made easy with the right set of cloud-based tools
![person building piles of gold coins that get larger as they go on](https://cdn.mos.cms.futurecdn.net/2uQiHXpvj9o47HZrdXyZfE-320-80.jpg)
How to set a pricing strategy that works for your business
By Zach Cooper published
In-depth A clear and consistent pricing strategy is vital for MSPs and VARs
![People and Robots](https://cdn.mos.cms.futurecdn.net/7omPsiKBivJ4muYbiWR6QZ-320-80.jpg)
How robotic automation is being applied to the workplace
By Zach Cooper published
In-depth A look at the various industry tasks that RPA is providing a helping hand to
![Openstack Logo](https://cdn.mos.cms.futurecdn.net/mkFMrDgScAkzT9bBCzo72e-320-80.png)
What is OpenStack?
By Zach Cooper, Rene Millman last updated
In-depth Want an alternative to AWS and Azure? We look at the open-source alternative
![null](https://cdn.mos.cms.futurecdn.net/3S2cpVAro8uSQurmD3jfKF-320-80.jpg)
GDPR compliance is the key to a smooth transition through Brexit
By Zach Cooper published
In-depth Brexit's effect on data laws demands that data management remains a top business priority for UK organisations
![Business classroom with a woman talking about cyber security, blue padlock image on whiteboard](https://cdn.mos.cms.futurecdn.net/3BBjRB7TFv8wtojSeTwKWJ-320-80.jpg)
Our 5-minute guide to security awareness training
By Zach Cooper, Esther Kezia Thorpe last updated
In-depth How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
![null](https://cdn.mos.cms.futurecdn.net/XWMGPjK9tqnfyVc6AVfepk-320-80.jpg)
CRMs listed as top technology priority for growing SMBs
By Zach Cooper published
Analysis CRM investment drives the wider success roles of sales and customer experience
![Illustration of a code cloud raining over a city](https://cdn.mos.cms.futurecdn.net/MQQHbEzjxMjib6Fh7LDmbS-320-80.jpg)
Our 5-minute guide to enterprise cloud computing
By Zach Cooper, Esther Kezia Thorpe, Grace Halverson last updated
In-depth What is enterprise cloud computing, how is it used, and what are the business benefits?
![Networks servers](https://cdn.mos.cms.futurecdn.net/bQEfqw3ZrGAEWJExJrRGNd-320-80.jpg)
Why enterprises are moving back to on-premise data centres
By Zach Cooper published
Analysis The initial cloud-rush is being undone as more and more firms revert workloads to on-premise
![Security](https://cdn.mos.cms.futurecdn.net/mNoeE6TiSvYssFWMYtVW8g-320-80.jpg)
Are you taking enough accountability on cyber security?
By Zach Cooper last updated
In-depth 60% of organisations have had at least one serious security incident this year
![A padlock on a circuit board in a dark room](https://cdn.mos.cms.futurecdn.net/Ac4YQsZyHatCHishgE9mFi-320-80.jpg)
Security flaws prevalent in applications produced by software vendors
By Zach Cooper published
Analysis Secure development is the key to a secure application