17 Jan Taking responsible action, now and for the future
6 Jan The current cyber threat level could be said to be elevated
1 Nov When measurement is refined breakthroughs follow, and not all of them predictable
16 Sep Once again, a good public plan has been so poorly implemented and badly communicated as to be nearly destroyed
6 Sep No easy ride for the Government lately, and that’s without looking across the pond
2 Sep For it to succeed, phishing extortion needs ignorance and silence
28 Aug The smallest words can make a significant difference in titles
14 Aug A cold look at some misinterpretations of the potential of 5G
26 Jul Yet another study show re-identification can be a little too easy
22 Jul Sometimes even the spooks get spiked
12 Jul Arguments for digital public services mount, fuelled by examples
5 Jul In denial, or in the know — some are clearly divorced from reality, what about the rest?
28 Jun When it comes to complex infrastructure programmes, we are in good company
14 Jun Is it time for the tech giants to come together for an Apollo-like effort on climate change?
20 May While connectivity in rural areas remains a concern, other indicators carry more worrying implications
10 Apr Calls for break up of tech giants have seemed fanciful, until now
15 Mar Whatever is thought of how it operates, Facebook has always been a paragon for operations
8 Mar The gender balance issue, not only in technology but business in general, must be addressed
14 Feb The recent discovery of vast collections of stolen identities are perplexing. Just what are the blackhats up to?
8 Feb Recent moves on data protection by authorities could indicate a direction for future activity
New Horizons Ireland
CCT College Dublin
View All Events
Submit Your Event
Click here to go to our index for resellers to source brands and determine who distributes them locally.
Customer and agent data exposed due to a security error made over New Year period
Vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications
IT admins can block the search engine change using either a group policy or by configuring Office 365 with Intune or Configuration Manager
Warning for Cisco Firepower management software is rated critical, among 26 other less urgent security advisories
If you think the cloud will drive data centres to extinction and that AI projects are doomed to fail, think again