Latest News

  • Passwords do not keep our personal data safe. That much is empirically clear – the sheer volume of passwords that are stolen and the ease with which they are cracked demonstrates this on a weekly basis. But it is not the theory of passwords that fails, it is the human inability to use them wisely that is the weakness.
  • Will 2014 see a big uptick in the use of biometric technologies, strong encryption, a rash of new key technologies and more? Some say that the era of having unencrypted data traffic flowing freely inside enterprises will likely soon come to a crashing halt, helped along by the US government, the Apple iPhone and other drivers.
  • Our final summary of industry predictions for 2014 focuses on the mobile arena. 'May you live in interesting times' is a common curse thought to originate in ancient China. 2014 is likely to be an interesting time for mobile users – with or without any involvement from modern China.
  • Microsoft has thrown its hat in the universal authentication ring with the Fast IDentity Online (FIDO) Alliance, joining as a member of the Board of Directors.
  • Tesco is introducing Alan Sugar's OptimEyes advertising screens to all 450 of its UK petrol stations. While customers look at the adverts, OptimEyes scans the customers, and feeds data back to the advertisers in real time.
view more

Trending Topic - #Heartbleed


  • Posted by IRM Plc • 14 April 2014
    By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times, titled...
  • Posted by Bob Tarzey • 21 March 2014
    It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for ...
  • Posted by Drew Amorosi • 17 March 2014
    Nine months and counting – nine months since Edward Snowden first told the world that the US government logged the metadata of all telephone traffic. Shortly after came PRISM, involvement by the...
  • Posted by Bob Tarzey • 10 March 2014
    Sometimes technology areas that once seem distinct converge. Indeed, there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and traditional t...
view more

Top Stories

view more


view more
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×