How safe is your data in the cloud? If you are wrestling with the idea of moving your customer and application data to the cloud, there are several fundamental things to consider. Who owns the [...]
The role of ITSM in the big IT security debate Recent events such as WannaCry and other hacking threats have caused budget holders to refocus on network and end-point IT security – but they may [...]