Effective Data Mesh Begins with Robust Data Governance 

Despite the growing emphasis on agility in the modern business landscape, it’s still surprisingly common to find organisations that rely on a rigid, centralised decision-making structure. This is particularly true amongst large enterprises, where embedded business practices and culture make any kind of change difficult to enact.   Traditional centralised structures typically see most of the […]

Women in Tech: Sparking Curiosity, Sustaining Success

The UK tech sector continues to face significant and persistent challenges with gender inequality, despite the industry’s claims of progress. While some strides have been made in the past decade,  women are still underrepresented in the industry, and alarmingly, being systematically pushed out altogether. Recent studies reveal that women are 1.6 times more likely to […]

The path of least resistance to Privileged Access Management 

Privileged Access Management (PAM) has been around for more than 20 years taking critical accounts and putting them into a vault to ensure only select individuals could access them securely. Since then, PAM has evolved and now focuses on controlling the access itself which means preventing broad access to specific data and providing insight into […]

Big ideas, smaller language models: how to get the most out of genAI

Since the debut of ChatGPT nearly two years ago, most businesses have at least dabbled with generative AI. Yet, for many, the initial excitement around large language models (LLMs) has given way to a more practical concern: how to prove their tangible value within the enterprise. LLMs gained global recognition for their flexibility, producing content […]

Companies Aren’t ‘Owning’ Their Data

With a rapidly developing threat landscape, an increase in high-profile data breaches, the introduction of new legislation, and customer tolerance for poor data handling at an all-time low, the stakes are high for companies to have robust cybersecurity in place. However, despite their best efforts, companies are often found to not be doing enough to […]

Data Resilience and Protection in the Ransomware Age

Data is the currency of every business today, but it is under significant threat. As companies rapidly collect and store data, it is driving a need to adopt multi-cloud solutions to store and protect it. At the same time, ransomware attacks are increasing in frequency and sophistication. This is supported by Rapid7’s Ransomware Radar Report 2024 which states, […]

Five cybersecurity priorities for our new global governments

2024 was dubbed “the election year” by TIME Magazine – a simple yet accurate description. From the UK’s general election earlier this summer, to the upcoming presidential election in the US in November, and the other 62 countries (at least) voting this year, it is time for governments to really make an impact. When it […]

Future-proofing industrial operations with an Industrial Data Fabric

Industrial businesses today grapple with the complexity of managing vast and varied data streams generated from their operations. According to Statista, the volume of data generated, consumed, copied, and stored is projected to reach more than 180 zettabytes by 2025. In 2020, the total amount of data generated and consumed was 64.2 zettabytes.  The challenge, however, […]

 A Roadmap to Modern Application Security

A decade ago, Silicon Valley venture capitalist Marc Andreeson famously declared that “software is eating the world.” A bold statement at the time. But it has since become clear that Andreeson was right. Software is now ubiquitous – and it touches nearly every aspect of our lives. Today’s shift to software has had a profound […]