mobile usage - News, Features, and Slideshows


  • Security threats through the Cloud

    As with most of technology, security goes through periodic changes, cycles and generations. Hardware, software, applications and methodologies all mature, become commoditised and standardised to the point of being invisible, and then are reinvented in a new evolved form. New platforms and new devices create new opportunities but are also subject to new evolved threats – something that remains true of security.

    Gordon Makryllos | 24 Sep | Read more