Homepage Analysis List

Tech’s Big Beasts Team Up in Bid to Defend the Open Source Oasis: Will It Be More than Hot Air?

Some of the biggest beasts of the tech world have teamed up to launch a new Open Source Security Foundation…

Avoiding DR and High Availability Pitfalls in the Hybrid Cloud

The private cloud remains the best choice for many applications for a variety of reasons, while the public cloud has…

A Central Bank Digital Currency? The Bank of England Ponders Proposal

The BoE (Bank of England) this month released a 57-page discussion paper entitled "Central Bank Digital Currency, Opportunities, challenges and…

The Eight Best SIEM Options for CISOs: A Digested Report

There will always be excellent software or IT services options that don’t fit into a Gartner Magic Quadrant; for a…

Vulnerabilities in the Core: Key Lessons from a Major Open Source Census

A major new Open Source census has identified the Top 20 most commonly used free and open source software (FOSS)…

Security Management and Risk Management Will Merge

Walk into the average business and you’ll find the information security function and the risk management function in different places,…

AWS Wavelength: The Cloud Comes to Your 5G Network

What is AWS Wavelength? Among a flurry of product announcements at AWS Re:Invent, one drew arguably the most buzz from…

A Role in Progress: The Future of the Chief Data Officer

It’s not just the advent of GDPR and similar data protection regulations fuelling the rise of the chief data officer…

The Limitations of Neural Networks: 3 Big Issues Dominate

Today, neural networks dominate the landscape of AI and AIOps, the question I pose is whether this is justifiable and…

EU Courts Consider Vital Data Transfer Tool

King Canute had a long and successful reign, becoming monarch of the North Sea Empire; England, Denmark and Norway, writes Peter…