Becoming Secure by Design is no simple process
Secure by Design is about building in security, starting with the design of a product. It is an approach that both NTT Ltd and Cisco are taking and goes far beyond...
How will professional services change post COVID-19
Professional Services Organisations are changing as a result of COVID-19 and the imposed lockdown in many countries. Enterprise Times sat down with Manav Singh, General Manager, Global Head of PSA suite...
Why should a time series database be part of your tech stack?
The quantity of time series data generated by enterprises is increasing. IoT and cybersecurity create a lot of this data but they are not alone. To understand where this data is...
Lessons from an experienced remote working organisation
Jeff Mills is UK country manager at WordPress VIP, part of the Automattic Group. The company was globally distributed from the start with its first two employees separated by the Atlantic....
Five questions to answer for a successful ERP implementation
Implementing an ERP solution is rarely straightforward, easy or even quick. Enterprise Times sat down with Peter Wong, Senior Director of professional service at Rootstock Software, to discuss the challenge. Wong...
How has COVID-19 changed life in the SOC?
Life in the SOC (Security Operation Center) is rarely slow. But as COVID-19 raged around the world and organisations scrambled to adapt to mass work from home, cybersecurity analysts found their...
Does your security really protect your staff?
Talk about security and protecting staff and most organisations immediately think about electronic threats. Yet being in the wrong place at the wrong time, risks being caught up in an earthquake,...
Solving the compliance puzzle of manufacturing MedTech
Over the last few months, the manufacturing industry has been impacted massively by COVID-19. In the Med-tech manufacturing vertical, business is booming. Other sectors have found demand has fallen to zero,...
Do you know how big your digital biodiversity is?
For IT security teams, remote working has exacerbated an already growing problem over device visibility. The explosion of IoT, containers, cloud and BYOD has created far more endpoints than organisations realise....
Weaponisation of IoT surges as threat actors leverage COVID-19
COVID-19 opened up a new opportunity for global threat actors. They have increased their use of old vulnerabilities, used COVID-19 lures to catch out the unwary and increased their weaponisation of...