-
Network becomes the computer: Borg versus EnterpriseWhat are the security strenths and weaknesses of relying on computer functionality delivered by the network being a centrally managed utility?...
-
Know your enemyMajor security incidents have featured prominently in the news recently. First there were the stolen diplomatic messages published on Wikileaks and then th...
-
Your RFP false start might not give you what you needWe often receive multi-million Euro RFIs, RFPs from organizations asking for business-critical services such as large private networks....