In-depth

What are biometrics?
Security

What are biometrics?

Your face, iris, DNA, and typing style can all be used as a password
27 Nov 2020
What is cloud security?
Blue square background with a yellow cloud superimposed, with a cut-out key icon on it to represent cloud security
Security

What is cloud security?

Storing data in the cloud has many benefits, but failure to secure it can lead to very real consequences
27 Nov 2020
The IT Pro Podcast: A post-COVID cloud future
Cloud

The IT Pro Podcast: A post-COVID cloud future

COVID has rewritten the rulebook for businesses - but will it last?
27 Nov 2020
How digital transformation is impacting application delivery
digital transformation

How digital transformation is impacting application delivery

Bridging the gap between traditional and microservice application delivery will be a new challenge for evolving businesses
26 Nov 2020
Four ways CIOs can drive digital transformation
digital transformation

Four ways CIOs can drive digital transformation

Practical steps business leaders can take to overcome digital transformation challenges
25 Nov 2020
What is cloud-to-cloud backup?
Multi cloud illustration on a blue and orange coloured background, with real cloud images overlaid
cloud backup

What is cloud-to-cloud backup?

C2C backup is growing in popularity, so what is it, and how can it help your business if the worst happens?
25 Nov 2020
Can blockchain fix voting?
a digital representation of chai links in blue
blockchain

Can blockchain fix voting?

Could digital voting have prevented the chaos before the US election? And can blockchain help now or in the future?
25 Nov 2020
What is phishing?
phishing

What is phishing?

From banking scams to industrial espionage, we look at why phishing is so lucrative
25 Nov 2020
What is two-factor authentication?
The two-factor authentication (2FA) process displayed on tablet and smartphone displays
Security

What is two-factor authentication?

Passwords aren't secure; it's time to add multi-factor authentication
25 Nov 2020
How to protect your remote workforce
Sponsored

How to protect your remote workforce

Working from home is the “new normal” for many, but how does a business keep its remote staff secure?
24 Nov 2020
Windows 10 and the tools for agile working
Sponsored

Windows 10 and the tools for agile working

How the shift to Windows 10 Pro can help to get your agile workforce moving
24 Nov 2020
Coronavirus creates new challenges for women in tech (and every other industry)
A woman in a facemask during the coronavirus crisis touching and looking out of a window
Careers & training

Coronavirus creates new challenges for women in tech (and every other industry)

The pandemic has exacerbated issues for women in an industry where representation is already a problem
24 Nov 2020
Secure your Wi-Fi against hackers in 10 steps
Abstract image showing a Wi-Fi logo on a cyber security background
Security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
23 Nov 2020
What makes an effective diversity strategy?
A multi-ethnic, mixed gender team of six colleagues sitting round a meeting room table listening to one member speak, who is in a wheelchair
Careers & training

What makes an effective diversity strategy?

Having a comprehensive diversity strategy is no longer a tick box exercise, it’s a vital business imperative.
23 Nov 2020
What is a managed IT service?
IT infrastructure digital illustration
Business operations

What is a managed IT service?

With two-thirds of businesses using them, learn about what managed IT services are and how they’re being used
23 Nov 2020
Five top tips for optimising your web forms
Person typing into a multi-page web form on a laptop - how to optimise web forms
customer experience (CX)

Five top tips for optimising your web forms

Web form best practices for business growth and great customer experience
23 Nov 2020
Broadband backup isn’t fit for business
A young man frustrated that his laptop isn't working
broadband

Broadband backup isn’t fit for business

Domestic web connections aren’t built for a nation of homeworkers
21 Nov 2020
Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?
2D clouds on a circuitboard background
cloud security

Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?

Each of these popular cloud platforms boasts robust security - but which does it best?
20 Nov 2020
Raspberry Pi: Top projects to try yourself
Raspberry PI
Mobile

Raspberry Pi: Top projects to try yourself

The best projects to try with the Raspberry Pi and Raspberry Pi Zero
20 Nov 2020
Make the web accessible
A laptop screen showing "access denied" text on a red background
user experience (UX)

Make the web accessible

Tiny text, muffled sound and fiddly controls can make browsing websites and operating apps hard work. Here's how to make them all easier to see, hear …
20 Nov 2020
Compact and bijou: Shrinking IT infrastructures
A person putting a storage device into a rack in a data centre
IT infrastructure

Compact and bijou: Shrinking IT infrastructures

Should your business reduce its IT infrastructure to remain competitive in a post-coronavirus landscape?
20 Nov 2020
The IT Pro Podcast: Modernising money management
digital transformation

The IT Pro Podcast: Modernising money management

How cloud technology, APIs and DevOps are revitalising digital banking
20 Nov 2020
Active vs passive reconnaissance
A shield with a keyhole on a radar system - cyber security - hacking
penetration testing

Active vs passive reconnaissance

Exploring essential tools of both ethical and malicious hackers alike
19 Nov 2020