

The story of 2020 is of the devastating COVID-19 pandemic, and of how the world adapted. The story of malware in 2020 then, is a story of how the tools and tactics of cybercrime and cybersecurity changed against a backdrop of enormous changes to ordinary life.
As entire businesses switched to remote working, IT teams...
Published: Feb 24, 2021


How CCPA relates to the access to, deletion of, and sharing of personal information and intends to provide Californian citizens with knowledge of what personal data is being collected about them and whether their personal data is being disclosed or sold and to whom.
Published: Feb 08, 2021


Too many enterprises still focus on edge and core security, and underinvest in data security. That’s the wrong approach. Databases hold most of your company’s most sensitive data, and remain the corporate asset most likely to be breached.
Learn how modern data security such as data activity monitoring...
Published: Feb 08, 2021


Extensibility is the key to agility—and it all starts with the right technology.
In our latest global innovation guide, learn how Workday Extend enables you to build custom apps that run alongside your existing Workday applications so you can stay agile in a changing world.
Published: Jan 29, 2021


How content sprawl happens, why it matters, and steps every IT leader should take to avoid it.
Sprawl happens when anyone and everyone can create a site or team, usually without oversight, planning, or any kind of formal training, resulting in dozens/hundreds of rarely used or abandoned sites and teams, a poorly-performing...
Published: Jan 18, 2021


To make cloud transformations as efficient and successful as possible, companies must remain secure and compliant throughout.
This Executive Brief paper explains that there are three strategic best practices that are key to ensure a secure and compliant cloud migrations, which every enterprise IT and security leader...
Published: Feb 08, 2021


The world of Identity and Access Management (IAM) is rarely controversial. But today, there is a battle brewing in how we—as an industry—talk about customer-facing use cases for IAM. Many are starting to refer to this as Customer IAM or Consumer IAM, both abbreviated as CIAM. CIAM does have some unique requirements....
Published: Feb 05, 2021


With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems—with Microsoft Windows at the forefront—Unix-based organizations face many identity and access management (IAM) challenges.
This white paper...
Published: Feb 19, 2021


COVID-19 has caused major disruption to business on a global scale creating the perfect storm for cyber criminals. Organizations around the world have been forced to pivot and adapt to a new way of working in order to remain operational while millions of people have made the switch to remote working and sheltering in place....
Published: Feb 08, 2021


This book consists of five chapters that explore:
The importance of identity, what it is, and how it has evolved (Chapter 1)
What modern identity (Identity as a Service) is and how it helps organizations address identity challenges and different use cases (Chapter 2)
The components of...
Published: Feb 05, 2021


Every enterprise today is looking for a strong foundation for their digital transformation. With the fast evolution of customer experience, marketers and developers must keep themselves ahead of the curve in customer experience management (CXM) technology to meet customer expectations.
Cloud Service provides...
Published: Feb 17, 2021


In just a few months, we have witnessed how organisations can operate, survive and even thrive under extreme circumstances. The winners have made decisions at pace, tested and learned quickly, and found new ways of doing business centered on digital business models.
See how your peers in Europe are transforming their...
Published: Dec 22, 2020


In early 2020, IDC performed in-depth primary research on how organizations determine workload placement as they evolve through digital transformation (DX) and what implications this has for modernized infrastructure objectives and strategies.
Most IT organizations are in the midst of a DX. IDC defines DX as the continuous...
Published: Jan 26, 2021


In the decade since the 2009 economic downturn in the UK, there have been a number of changes in the construction industry. With consolidation in the sector and intensification of competition, companies have found themselves having to identify technology to help them become more efficient not only in the bidding...
Published: Feb 02, 2021