Homepage Top Feature

The 10 best open-source software tools for developing IoT applications

The Internet of Things (IoT) is today almost omnipresent in everyone's day-to-day life. From Wi-Fi kettles to elaborate and professional…

Is SAP’s 2027 deadline real?

The year 2025 was originally the S/4HANA deadline. However, it was way too optimistic as a timescale for the SAP…

Emotet taken down in major international operation, but is the malware gone for good?

A major operation by security agencies from around the world saw critical infrastructure behind the Emotet botnet taken offline this…

Inequality of internet access increases as Covid-19 exacerbates digital divide

The Covid-19 pandemic has increased inequality of internet access around the world, with almost half of households on the planet…

Computer Business Review Has Some News…

Computer Business Review – founded in 1993 and long a stalwart of the business technology world – is shedding its…

Will Government National Data Strategy Deliver on Eliminating Data Silos?

The Government National Data Strategy (NDS) sets out lofty plans for a cohesive, government-wide data architecture. Although much of its…

“Confidence in Chaos”? Ten Technologies for ‘Grey Zone’ Conflicts

As warfare increasingly focuses to the digital battlefield, ten emerging technologies have been identified that could help Western security forces…

Europe Sharpens IT Incident Reporting Requirements, Puts Cloud SLAs Under Microscope

A sprawling Digital Finance Package, adopted by the European Commission this week, includes proposals for a new Europe-wide Digital Operational…

Down to the Wire: AWS Delays “Path-Style” S3 Deprecation at Last Minute

AWS has delayed plans to kill off support for a certain type of S3 storage bucket access path, less than…

Is Your Ransomware Incident Response Plan Future-Proof?

Ransomware has become one of the top cybersecurity threats today. In 2019, it reached new heights when the number of…